Description
Ghost is a Node.js content management system. In versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's handling of Staff Token authentication allowed certain endpoints to be accessed that were only intended to be accessible via Staff Session authentication. External systems that have been authenticated via Staff Tokens for Admin/Owner-role users would have had access to these endpoints. This issue has been patched in versions 5.130.6 and 6.11.0.
Published: 2026-01-10
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized privileged endpoint access
Action: Patch immediately
AI Analysis

Impact

Ghost’s staff token authentication mechanism was inadvertently allowing certain administrative endpoints to be reached by any user possessing a staff token, regardless of the token’s intended session context. This bypass enabled users authenticated through staff tokens with Admin or Owner roles to call APIs that were only meant for session-based staff users, effectively granting them elevated privileges and the ability to perform actions normally restricted to privileged sessions. The vulnerability is a classic role-based privilege escalation flaw (CWE-863). It does not enable arbitrary code execution, but it does expose sensitive management functionality to unauthorized API callers.

Affected Systems

The vulnerability affects the Ghost content management system (Node.js) versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3. The issue was rectified in Ghost 5.130.6 and 6.11.0; newer releases beyond these commits incorporate the fix. System administrators should verify that the hosting platform is running a patched Ghost instance from at least these version thresholds.

Risk and Exploitability

The CVSS score of 8.1 signals a high-severity flaw that threatens confidentiality, integrity, and availability of the administrative functions. However, the EPSS score is reported as less than 1%, indicating a very low probability of exploitation in the wild. The vulnerability is not currently listed in CISA’s KEV catalog. Attackers would need to obtain a valid staff token for a user with Admin/Owner role, which could occur through credential compromise or social engineering. Once a token is in hand, the bypass is straightforward and can be repeated against any protected endpoint.

Generated by OpenCVE AI on April 18, 2026 at 07:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ghost to version 5.130.6 or newer, or to 6.11.0 or newer, to apply the official fix.
  • Implement a temporary access control rule to block staff‑token requests from reaching administrative API routes, ensuring that only session‑based staff authentication can invoke those endpoints.
  • Rotate or revoke all existing staff tokens for users with Admin or Owner roles, then issue new tokens to eliminate the risk of compromised credentials exploiting the bypass.

Generated by OpenCVE AI on April 18, 2026 at 07:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9xg7-mwmp-xmjx Ghost has Staff Token permission bypass
History

Thu, 15 Jan 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*

Mon, 12 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Ghost
Ghost ghost
Vendors & Products Ghost
Ghost ghost

Sat, 10 Jan 2026 03:15:00 +0000

Type Values Removed Values Added
Description Ghost is a Node.js content management system. In versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's handling of Staff Token authentication allowed certain endpoints to be accessed that were only intended to be accessible via Staff Session authentication. External systems that have been authenticated via Staff Tokens for Admin/Owner-role users would have had access to these endpoints. This issue has been patched in versions 5.130.6 and 6.11.0.
Title Ghost has Staff Token permission bypass
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-12T17:51:41.017Z

Reserved: 2026-01-07T21:50:39.532Z

Link: CVE-2026-22595

cve-icon Vulnrichment

Updated: 2026-01-12T17:51:36.740Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-10T03:15:50.553

Modified: 2026-01-15T18:34:49.013

Link: CVE-2026-22595

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:15:25Z

Weaknesses