Insecure Default in Ghost Foundation Software Allows Unauthorized Script Injection
CVE-2022-47196

9CRITICAL

Key Information:

Status
Vendor
CVE Published:
19 January 2023

What is CVE-2022-47196?

A security flaw exists in the Post Creation functionality of Ghost Foundation's software, specifically in version 5.9.4. Default configurations permit unauthorized users to inject arbitrary JavaScript into posts. This can lead to privilege escalation through cross-site scripting (XSS) if an attacker successfully tricks an administrator into visiting a compromised post. The vulnerability also involves stored XSS within the codeinjection_head segment of a post, further exposing the system to potential exploits. It's essential for users to review their configurations and apply necessary updates to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Ghost 5.9.4

References

CVSS V3.1

Score:
9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

CVSS V3.0

Score:
9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.