Ghost is a Node.js content management system. In versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's handling of Staff Token authentication allowed certain endpoints to be accessed that were only intended to be accessible via Staff Session authentication. External systems that have been authenticated via Staff Tokens for Admin/Owner-role users would have had access to these endpoints. This issue has been patched in versions 5.130.6 and 6.11.0.
References
Configurations
Configuration 1 (hide)
|
History
15 Jan 2026, 18:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/TryGhost/Ghost/commit/9513d2a35c21067127ce8192443d8919ddcefcc8 - Patch | |
| References | () https://github.com/TryGhost/Ghost/commit/c3017f81a5387b253a7b8c1ba1959d430ee536a3 - Patch | |
| References | () https://github.com/TryGhost/Ghost/security/advisories/GHSA-9xg7-mwmp-xmjx - Patch, Vendor Advisory | |
| First Time |
Ghost
Ghost ghost |
|
| CPE | cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:* |
10 Jan 2026, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-10 03:15
Updated : 2026-01-15 18:34
NVD link : CVE-2026-22595
Mitre link : CVE-2026-22595
CVE.ORG link : CVE-2026-22595
JSON object : View
Products Affected
ghost
- ghost
CWE
CWE-863
Incorrect Authorization
