Description
An arbitrary file upload vulnerability in the file upload module of Ghost CMS v4.42.0 allows attackers to execute arbitrary code via a crafted file. NOTE: Vendor states as detailed in Ghost's security documentation, files can only be uploaded and published by trusted users, this is intentional
References (6)
Core 6
Core References
Product x_refsource_misc
http://ghost.com
Product x_refsource_misc
https://ghost.org/customers/
Third Party Advisory x_refsource_misc
https://github.com/TryGhost/Ghost
Product x_refsource_misc
https://trends.builtwith.com/cms/Ghost
Exploit, Third Party Advisory x_refsource_misc
https://youtu.be/PncfBetPk2g
Various Sources x_refsource_misc
https://ghost.org/docs/security/#privilege-escalation-attacks
Scores
CVSS v3
9.8
EPSS
0.0403
EPSS Percentile
88.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (2)
ghost/ghost
4.42.0
npm/ghost
0npm
Published
Apr 12, 2022
Tracked Since
Feb 18, 2026