Ghost through 5.76.0 allows stored XSS, and resultant privilege escalation in which a contributor can take over any account, via an SVG profile picture that contains JavaScript code to interact with the API on localhost TCP port 3001. NOTE: The discoverer reports that "The vendor does not view this as a valid vector."
{
"nvd_published_at": "2024-02-11T01:15:08Z",
"github_reviewed_at": "2024-02-12T19:35:28Z",
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true
}