CVE-2026-22597
Unknown Unknown - Not Provided
SSRF Vulnerability in Ghost CMS Media Inliner Allows Data Exfiltration

Publication date: 2026-01-10

Last updated on: 2026-04-29

Assigner: GitHub, Inc.

Description
Ghost is a Node.js content management system. In versions 5.38.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost’s media inliner mechanism allows staff users in possession of a valid authentication token for the Ghost Admin API to exfiltrate data from internal systems via SSRF. This issue has been patched in versions 5.130.6 and 6.11.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-10
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-01-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
tryghost ghost From 5.38.0 (inc) to 5.130.5 (inc)
tryghost ghost From 6.0.0 (inc) to 6.10.3 (inc)
tryghost ghost 5.130.6
tryghost ghost 6.11.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-22597 is a Server-Side Request Forgery (SSRF) vulnerability in the Ghost blogging platform's media inliner component. It allows authenticated staff users with a valid Ghost Admin API token to craft URLs for media assets that, when processed, cause the server to make unauthorized requests to internal network resources. This can lead to exfiltration of data from internal systems. The vulnerability arises because the media inliner did not properly restrict requests to internal IP address ranges. The issue was fixed by replacing the HTTP request library with one that blocks requests to internal IP addresses, preventing SSRF attacks targeting internal resources. [1, 2, 3]


How can this vulnerability impact me? :

If exploited, this vulnerability allows a malicious staff user to exfiltrate data from internal systems by making the server send unauthorized requests to internal network URLs. This could lead to unauthorized disclosure of sensitive internal data. However, exploitation requires staff-level authentication tokens, so the attacker must already have elevated privileges. The impact on confidentiality is considered low to moderate, with no direct impact on integrity or availability. [3, 1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this SSRF vulnerability involves monitoring for unusual or unauthorized requests made by the Ghost media inliner to internal network addresses. Since the vulnerability allows staff users with valid authentication tokens to craft URLs that cause the server to make requests to internal IP ranges, you can detect exploitation attempts by inspecting logs for outbound HTTP requests to private IP addresses (e.g., 192.168.x.x, 10.x.x.x, 172.16.x.x - 172.31.x.x) originating from the Ghost server. Commands to help detect such activity include: 1. Using network monitoring tools like tcpdump or Wireshark to capture outbound HTTP requests from the Ghost server and filter for private IP ranges. Example: `tcpdump -i eth0 dst net 192.168.0.0/16 or dst net 10.0.0.0/8 or dst net 172.16.0.0/12 and port 80 or port 443` 2. Checking Ghost application logs or web server logs for requests to the media inliner endpoint containing suspicious URLs pointing to internal IPs. 3. Using curl or similar tools to test if the media inliner processes URLs pointing to internal IPs (in a controlled test environment). However, the official fix replaces the HTTP request library to block requests to internal IPs, so verifying the Ghost version is patched is also critical. If unpatched, monitoring for such requests is key. [1, 2, 3]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Ghost CMS to a patched version where this vulnerability is fixed. Specifically, upgrade to Ghost version 5.130.6 or later in the 5.x series, or 6.11.0 or later in the 6.x series. These versions include a fix that replaces the HTTP request library used by the media inliner with a restricted library that blocks requests to internal IP address ranges, preventing SSRF exploitation. Additionally, restrict staff user privileges and ensure that only trusted users have access to valid Ghost Admin API tokens. If upgrading immediately is not possible, consider implementing network-level controls such as firewall rules to block outbound HTTP requests from the Ghost server to internal IP ranges to reduce risk. [1, 2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart