Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9xg7-mwmp-xmjx | Ghost has Staff Token permission bypass |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 15 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:* |
Mon, 12 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ghost
Ghost ghost |
|
| Vendors & Products |
Ghost
Ghost ghost |
Sat, 10 Jan 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ghost is a Node.js content management system. In versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's handling of Staff Token authentication allowed certain endpoints to be accessed that were only intended to be accessible via Staff Session authentication. External systems that have been authenticated via Staff Tokens for Admin/Owner-role users would have had access to these endpoints. This issue has been patched in versions 5.130.6 and 6.11.0. | |
| Title | Ghost has Staff Token permission bypass | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-12T17:51:41.017Z
Reserved: 2026-01-07T21:50:39.532Z
Link: CVE-2026-22595
Updated: 2026-01-12T17:51:36.740Z
Status : Analyzed
Published: 2026-01-10T03:15:50.553
Modified: 2026-01-15T18:34:49.013
Link: CVE-2026-22595
No data.
OpenCVE Enrichment
Updated: 2026-01-12T14:36:52Z
Github GHSA