Total vulnerabilities in the database
An authentication bypass vulnerability exists in the newsletter subscription functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability.
Software | From | Fixed in |
---|---|---|
ghost / ghost | 4.46.0 | 4.48.8 |
ghost / ghost | 5.0.0 | 5.22.7 |
![]() |
5.0.0 | 5.22.7 |
![]() |
4.46.0 | 4.48.8 |