Ghost is an app for new-media creators with tools to build a website, publish content, send newsletters, and offer paid subscriptions to members. Prior to version 5.46.1, due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack.

Ghost(Pro) has already been patched. Maintainers can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version below v5.46.1. v5.46.1 contains a fix for this issue. As a workaround, add a block for requests to `/ghost/api/content/*` where the `filter` query parameter contains `password` or `email`.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r97q-ghch-82j9 Ghost vulnerable to information disclosure of private API fields
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 29 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-01-29T14:53:24.054Z

Reserved: 2023-04-24T21:44:10.416Z

Link: CVE-2023-31133

cve-icon Vulnrichment

Updated: 2024-08-02T14:45:25.764Z

cve-icon NVD

Status : Modified

Published: 2023-05-08T21:15:11.600

Modified: 2024-11-21T08:01:27.613

Link: CVE-2023-31133

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.