CVE-2026-29784

7.5 HIGH

📋 TL;DR

Ghost CMS versions 5.101.6 through 6.19.2 have incomplete CSRF protections in the session verification endpoint, allowing attackers to use one-time codes across different login sessions. This could enable phishing attacks to compromise Ghost site administrator accounts. All Ghost installations using affected versions are vulnerable.

💻 Affected Systems

Products:
  • Ghost CMS
Versions: 5.101.6 to 6.19.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Ghost installations with admin panel accessible. Self-hosted instances are vulnerable; Ghost(Pro) managed hosting is patched automatically.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could hijack administrator sessions, gain full control of the Ghost site, modify content, install malicious themes/plugins, and potentially access underlying server resources.

🟠

Likely Case

Phishing campaigns could trick administrators into using OTCs that attackers then leverage to hijack sessions and gain unauthorized access to the admin panel.

🟢

If Mitigated

With proper network segmentation and admin access restrictions, impact would be limited to the Ghost application itself without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick users into performing actions with OTCs. No public exploit code available but advisory provides technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.19.3

Vendor Advisory: https://github.com/TryGhost/Ghost/security/advisories/GHSA-9m84-wc28-w895

Restart Required: Yes

Instructions:

1. Backup your Ghost installation and database. 2. Update Ghost using npm: 'npm update ghost'. 3. Restart the Ghost service: 'ghost restart'. 4. Verify version is 6.19.3 or higher.

🔧 Temporary Workarounds

Restrict Admin Access

linux

Limit admin panel access to specific IP addresses or VPN-only connections

Use firewall rules: iptables -A INPUT -p tcp --dport 2368 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 2368 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to admin interface
  • Enable multi-factor authentication for all admin accounts and monitor for suspicious login attempts

🔍 How to Verify

Check if Vulnerable:

Check Ghost version in admin panel Settings → About, or run: ghost version

Check Version:

ghost version

Verify Fix Applied:

Confirm version is 6.19.3 or higher using ghost version command

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed session verification attempts
  • OTC usage from unusual IP addresses
  • Admin logins from unexpected locations

Network Indicators:

  • Unusual traffic patterns to /session/verify endpoint
  • CSRF token mismatches in logs

SIEM Query:

source="ghost.log" AND ("session/verify" OR "CSRF") AND (status=200 OR status=403)

🔗 References

📤 Share & Export