{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T02:32:56.736","vulnerabilities":[{"cve":{"id":"CVE-2026-24778","sourceIdentifier":"security-advisories@github.com","published":"2026-01-27T22:15:57.097","lastModified":"2026-02-02T15:21:41.313","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaScript with the victim's permissions, potentially leading to account takeover. Ghost Portal versions 2.29.1 through 2.51.4 and 2.52.0 through 2.57.0 were vulnerable to this issue. Ghost automatically loads the latest patch of the members Portal component via CDN. For Ghost 5.x users, upgrading to v5.121.0 or later fixes the vulnerability. v5.121.0 loads Portal v2.51.5, which contains the patch. For Ghost 6.x users, upgrading to v6.15.0 or later fixes the vulnerability. v6.15.0 loads Portal v2.57.1, which contains the patch. For Ghost installations using a customized or self-hosted version of Portal, it will be necessary to manually rebuild from or update to the latest patch version."},{"lang":"es","value":"Ghost es un sistema de gestión de contenido de código abierto. En las versiones de Ghost 5.43.0 a 5.12.04 y 6.0.0 a 6.14.0, un atacante pudo crear un enlace malicioso que, cuando era accedido por un usuario de personal o miembro autenticado, ejecutaría JavaScript con los permisos de la víctima, lo que podría llevar a la toma de control de la cuenta. Las versiones de Ghost Portal 2.29.1 a 2.51.4 y 2.52.0 a 2.57.0 eran vulnerables a este problema. Ghost carga automáticamente el último parche del componente Portal de miembros a través de CDN. Para los usuarios de Ghost 5.x, actualizar a la v5.121.0 o posterior corrige la vulnerabilidad. La v5.121.0 carga Portal v2.51.5, que contiene el parche. Para los usuarios de Ghost 6.x, actualizar a la v6.15.0 o posterior corrige la vulnerabilidad. La v6.15.0 carga Portal v2.57.1, que contiene el parche. Para las instalaciones de Ghost que utilizan una versión personalizada o autoalojada de Portal, será necesario reconstruir manualmente desde o actualizar a la última versión del parche."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*","versionStartIncluding":"5.43.0","versionEndExcluding":"5.121.0","matchCriteriaId":"3A161191-AE97-4B51-B99C-C5E3AE212FF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.15.0","matchCriteriaId":"20D558C0-11D9-467C-9D0B-0FA15D19637E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ghost:portal:*:*:*:*:*:node.js:*:*","versionStartIncluding":"2.29.1","versionEndExcluding":"2.51.5","matchCriteriaId":"30E5D4C3-A2BD-4816-AFAB-187DB71D3FFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:ghost:portal:*:*:*:*:*:node.js:*:*","versionStartIncluding":"2.52.0","versionEndExcluding":"2.57.1","matchCriteriaId":"4B387332-AE38-4C8E-BCBE-DD669474AA9E"}]}]}],"references":[{"url":"https://github.com/TryGhost/Ghost/commit/da858e640e88e69c1773a7b7ecdc2008fa143849","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/TryGhost/Ghost/security/advisories/GHSA-gv6q-2m97-882h","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}