CVE-2022-41654

Source
https://cve.org/CVERecord?id=CVE-2022-41654
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-41654.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-41654
Aliases
Related
Published
2022-12-22T10:15:10.047Z
Modified
2026-04-12T05:07:09.793419Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

An authentication bypass vulnerability exists in the newsletter subscription functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability.

References

Affected packages

Git / github.com/tryghost/ghost

Affected ranges

Type
GIT
Repo
https://github.com/tryghost/ghost
Events
Database specific
{
    "cpe": "cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*",
    "extracted_events": [
        {
            "introduced": "4.46.0"
        },
        {
            "fixed": "4.48.8"
        },
        {
            "introduced": "5.0.0"
        },
        {
            "fixed": "5.22.7"
        }
    ],
    "source": "CPE_FIELD"
}

Affected versions

@tryghost/portal@2.*
@tryghost/portal@2.13.2
@tryghost/portal@2.14.0
@tryghost/portal@2.16.0
@tryghost/portal@2.17.0
@tryghost/portal@2.18.0
@tryghost/portal@2.19.3
@tryghost/portal@2.19.5
@tryghost/portal@2.19.6
@tryghost/portal@2.19.7
@tryghost/portal@2.19.8
v4.*
v4.46.0
v4.46.1
v4.46.2
v4.47.0
v4.47.1
v4.47.2
v4.47.3
v4.47.4
v4.48.0
v4.48.1
v4.48.2
v4.48.3
v4.48.4
v4.48.5
v4.48.6
v4.48.7
v5.*
v5.0.0
v5.0.1
v5.1.0
v5.1.1
v5.10.0
v5.11.0
v5.12.0
v5.12.1
v5.13.0
v5.14.0
v5.15.0
v5.16.0
v5.17.0
v5.18.0
v5.19.0
v5.2.0
v5.2.1
v5.2.2
v5.2.3
v5.20.0
v5.21.0
v5.22.6
v5.3.0
v5.4.0
v5.5.0
v5.6.0
v5.7.0
v5.7.1
v5.8.0
v5.8.1
v5.8.2
v5.8.3
v5.9.0
v5.9.1
v5.9.2
v5.9.3
v5.9.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-41654.json"