Authentication Bypass in Ghost CMS Affects User Access Control
CVE-2026-22595

8.1HIGH

Key Information:

Vendor

Tryghost

Status
Vendor
CVE Published:
10 January 2026

What is CVE-2026-22595?

Ghost, a popular Node.js content management system, has a vulnerability that affects specific versions, allowing unauthorized access to endpoints meant only for Staff Session authentication. This issue arises from the way Ghost handles Staff Token authentication, potentially granting external systems authenticated as Admin or Owner users inappropriate access. The vulnerability has been addressed in subsequent updates, and users are strongly advised to upgrade to versions 5.130.6 and 6.11.0 or later to ensure system security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Ghost >= 6.0.0, < 6.11.0 < 6.0.0, 6.11.0

Ghost >= 5.121.0, < 5.130.6 < 5.121.0, 5.130.6

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.