ghost@2.0.0 vulnerabilities
The professional publishing platform
-
latest version
5.101.2
-
first published
13 years ago
-
latest version published
2 days ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the ghost package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
ghost is a publishing platform Affected versions of this package are vulnerable to Improper Neutralization of Formula Elements in a CSV File during a member CSV export. An attacker can execute arbitrary commands by injecting maliciously crafted CSV content. How to fix Improper Neutralization of Formula Elements in a CSV File? Upgrade |
<5.82.0
|
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via an SVG profile picture upload. A contributor user can cause scripts to be executed as owner. How to fix Cross-site Scripting (XSS)? Upgrade |
<5.83.0
|
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? Upgrade |
<5.76.0
|
ghost is a publishing platform Affected versions of this package are vulnerable to Arbitrary File Read which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Note:
Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's How to fix Arbitrary File Read? Upgrade |
<5.59.1
|
ghost is a publishing platform Affected versions of this package are vulnerable to Directory Traversal due to allowing remote attackers to read arbitrary files within the active theme's folder via How to fix Directory Traversal? Upgrade |
<5.42.1
|
ghost is a publishing platform Affected versions of this package are vulnerable to Information Exposure such that due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack. How to fix Information Exposure? Upgrade |
<5.46.1
|
ghost is a publishing platform Affected versions of this package are vulnerable to Access Restriction Bypass that allows contributors to view draft posts of other users via the NOTE: The vendor's position is that this behavior has no security impact. How to fix Access Restriction Bypass? There is no fixed version for |
>=0.4.2-rc1
|
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the How to fix Cross-site Scripting (XSS)? There is no fixed version for |
>=0.0.0
|
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the How to fix Cross-site Scripting (XSS)? There is no fixed version for |
>=0.0.0
|
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the How to fix Cross-site Scripting (XSS)? There is no fixed version for |
>=0.0.0
|
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the How to fix Cross-site Scripting (XSS)? There is no fixed version for |
>=0.0.0
|
ghost is a publishing platform Affected versions of this package are vulnerable to Remote Code Execution (RCE) via a file that has previously been uploaded using the file upload functionality in the post editor. How to fix Remote Code Execution (RCE)? Upgrade |
<4.48.2
>=5.0.0 <5.2.3
|
ghost is a publishing platform Affected versions of this package are vulnerable to Command Injection. Sites using the How to fix Command Injection? Upgrade |
<4.15.0
|
ghost is a publishing platform Affected versions of this package are vulnerable to Open Redirect. It allows redirecting to external sites after providing private site password. How to fix Open Redirect? Upgrade |
<3.41.1
|
ghost is a publishing platform Affected versions of this package are vulnerable to Open Redirect. It is possible for an attack to redirect a user to an external sit after providing a private site password. How to fix Open Redirect? Upgrade |
<2.38.3
|
ghost is a publishing platform Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). It provides an attacker the ability of Internal port scanning, or reading How to fix Server-side Request Forgery (SSRF)? Upgrade |
<2.38.2
|
ghost is a publishing platform Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF). Previously, when Ghost could not determine an origin of a request it would return a How to fix Cross-Site Request Forgery (CSRF)? Upgrade |
<3.13.0
|
ghost is a publishing platform Affected versions of this package are vulnerable to Server Side Request Forgery (SSRF). The How to fix Server Side Request Forgery (SSRF)? Upgrade |
<2.38.1
>=3.0.0 <3.10.0
|