First published: Thu Dec 22 2022(Updated: )
An authentication bypass vulnerability exists in the newsletter subscription functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ghost | >=4.46.0<4.48.8 | |
Ghost | >=5.0.0<5.22.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-41654.
The severity of CVE-2022-41654 is critical.
The affected software is Ghost Foundation Ghost 5.9.4.
An attacker can exploit CVE-2022-41654 by sending a specially-crafted HTTP request to the newsletter subscription functionality of Ghost.
Yes, you can find references for CVE-2022-41654 at the following links: [link1](https://github.com/TryGhost/Ghost/security/advisories/GHSA-9gh8-wp53-ccc6) and [link2](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1624).