First published: Wed May 03 2023(Updated: )
### Impact Due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack. Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version below v5.46.1. Immediate action should be taken to secure your site - see patches and workarounds below. ### Patches v5.46.1 contains a fix for this issue. ### Workarounds Add a block for requests to `/ghost/api/content/*` where the `filter` query parameter contains `password` or `email`. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/ghost | <5.46.1 | 5.46.1 |
Ghost Ghost Node.js | <5.46.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31133 is considered to have a medium severity due to its potential for exposing private fields via brute force attacks.
To fix CVE-2023-31133, you should upgrade to Ghost version 5.46.1 or later.
CVE-2023-31133 affects all versions of Ghost prior to version 5.46.1.
There is currently no evidence that CVE-2023-31133 has been exploited in the wild prior to the release of the patch.
CVE-2023-31133 addresses a lack of validation when filtering on the public API, which could allow brute force attacks to reveal private fields.