logo

CVE-2024-43409 ghost

Package

Manager: npm
Name: ghost
Vulnerable Version: >=4.46.0 <5.89.5

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00142 pctl0.35017

Details

Ghost's improper authentication allows access to member information and actions ### Impact Improper authentication on some endpoints used for member actions would allow an attacker to perform member-only actions, and read member information. ### Vulnerable versions This security vulnerability is present in Ghost v4.46.0-v5.89.5. Ghost(Pro) customers are automatically updated to fixed versions ahead of disclosure. If you're a self-hoster, please follow our [update instructions](https://ghost.org/docs/update). ### Patches v5.89.5 contains a fix for this issue. ### Workarounds Disable site membership in Ghost settings. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org)

Metadata

Created: 2024-08-20T20:04:49Z
Modified: 2024-10-29T20:00:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-78x2-cwp9-5j42/GHSA-78x2-cwp9-5j42.json
CWE IDs: ["CWE-284", "CWE-287"]
Alternative ID: GHSA-78x2-cwp9-5j42
Finding: F039
Auto approve: 1