Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might have made it easier for phishers to take over a Ghost site. This issue has been patched in version 6.19.3.
References
Configurations
History
09 Mar 2026, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/TryGhost/Ghost/commit/ec065a774fa125953d2aa644a59cd8990329e0a0 - Patch | |
| References | () https://github.com/TryGhost/Ghost/security/advisories/GHSA-9m84-wc28-w895 - Vendor Advisory | |
| Summary |
|
|
| First Time |
Ghost
Ghost ghost |
|
| CPE | cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:* |
07 Mar 2026, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-07 16:15
Updated : 2026-03-09 20:06
NVD link : CVE-2026-29784
Mitre link : CVE-2026-29784
CVE.ORG link : CVE-2026-29784
JSON object : View
Products Affected
ghost
- ghost
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
