First published: Fri May 05 2023(Updated: )
Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/ghost | <5.42.1 | 5.42.1 |
Ghost Ghost Node.js | <5.42.1 | |
Ghost | <5.42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-32235.
The severity of CVE-2023-32235 is high with a CVSS score of 7.5.
Remote attackers can exploit CVE-2023-32235 to read arbitrary files within the active theme's folder through directory traversal.
Ghost versions up to but excluding 5.42.1 are affected by CVE-2023-32235.
To fix CVE-2023-32235, update Ghost to version 5.42.1.