An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject Javascript in a post to trick an administrator into visiting the post.A stored XSS vulnerability exists in the `twitter` field for a user.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-03T14:47:29.485Z
Reserved: 2022-12-12T19:47:21.503Z
Link: CVE-2022-47194

No data.

Status : Modified
Published: 2023-01-19T18:15:13.553
Modified: 2024-11-21T07:31:41.080
Link: CVE-2022-47194

No data.