Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f7qg-xj45-w956

Опубликовано: 15 сент. 2025
Источник: github
Github: Прошло ревью
CVSS4: 6.1

Описание

Ghost vulnerable to Server Side Request Forgery (SSRF) via oEmbed Bookmark

Impact

A vulnerability in Ghost's oEmbed mechanism allows staff users to exfiltrate data from internal systems via SSRF.

Vulnerable versions

This vulnerability is present in Ghost v5.99.0 to v5.130.3 to and Ghost v6.0.0 to v6.0.8.

Patches

v5.130.4 and v6.0.9 contain a fix for this issue.

References

The original report is available here: https://fluidattacks.com/advisories/regida

We thank Cristian Vargas for discovering and disclosing this vulnerability responsibly.

For more information

If you have any questions or comments about this advisory, email us at security@ghost.org.

Пакеты

Наименование

ghost

npm
Затронутые версииВерсия исправления

>= 6.0.0, <= 6.0.8

6.0.9

Наименование

ghost

npm
Затронутые версииВерсия исправления

>= 5.99.0, <= 5.130.3

5.130.4

EPSS

Процентиль: 14%
0.00047
Низкий

6.1 Medium

CVSS4

Дефекты

CWE-918

Связанные уязвимости

nvd
29 дней назад

Server-Side Request Forgery (SSRF) vulnerability in Ghost allows an attacker to access internal resources.This issue affects Ghost: from 6.0.0 through 6.0.8, from 5.99.0 through 5.130.3.

debian
29 дней назад

Server-Side Request Forgery (SSRF) vulnerability in Ghost allows an at ...

EPSS

Процентиль: 14%
0.00047
Низкий

6.1 Medium

CVSS4

Дефекты

CWE-918