Home

Description

Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaScript with the victim's permissions, potentially leading to account takeover. Ghost Portal versions 2.29.1 through 2.51.4 and 2.52.0 through 2.57.0 were vulnerable to this issue. Ghost automatically loads the latest patch of the members Portal component via CDN. For Ghost 5.x users, upgrading to v5.121.0 or later fixes the vulnerability. v5.121.0 loads Portal v2.51.5, which contains the patch. For Ghost 6.x users, upgrading to v6.15.0 or later fixes the vulnerability. v6.15.0 loads Portal v2.57.1, which contains the patch. For Ghost installations using a customized or self-hosted version of Portal, it will be necessary to manually rebuild from or update to the latest patch version.

PUBLISHED Reserved 2026-01-26 | Published 2026-01-27 | Updated 2026-01-28 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

@tryghost/portal >= 2.29.1, < 2.51.5
affected

@tryghost/portal >= 2.52.0, < 2.57.1
affected

ghost >= 5.43.0, < 5.121.0
affected

ghost >= 6.0.0, < 6.15.0
affected

References

github.com/.../Ghost/security/advisories/GHSA-gv6q-2m97-882h

github.com/...ommit/da858e640e88e69c1773a7b7ecdc2008fa143849

cve.org (CVE-2026-24778)

nvd.nist.gov (CVE-2026-24778)

Download JSON