#VU69656 Improper access control in Ghost


Published: 2023-04-11

Vulnerability identifier: #VU69656

Vulnerability risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-41654

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Ghost
Web applications / CMS

Vendor: Ghost

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper API validation for nested objects. A remote user can bypass implemented security restrictions and make changes to newsletter settings.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Ghost: 5.0.0 - 5.22.6, 4.46.0 - 4.48.7


External links
http://github.com/TryGhost/Ghost/security/advisories/GHSA-9gh8-wp53-ccc6


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability