CVE-2026-29784: Ghost CSRF — Patch Guide
CVE-2026-29784
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the reque...
Overview
A security vulnerability has been identified in Ghost, a popular Node.js-based content management system. This flaw, tracked as CVE-2026-29784, involves incomplete Cross-Site Request Forgery (CSRF) protections. It affects Ghost versions from 5.101.6 up to, but not including, version 6.19.3. The vulnerability has been assigned a HIGH severity rating with a CVSS score of 7.5.
Vulnerability Explained
In simple terms, this vulnerability exists in the session verification endpoint (/session/verify). Due to insufficient CSRF safeguards, a One-Time Code (OTC) used for login could potentially be validated in a different user session than the one intended. This weakness could be exploited by an attacker who tricks an authenticated Ghost administrator into performing an unwanted action, such as clicking a malicious link.
Potential Impact
The primary risk is that this flaw could facilitate phishing attacks aimed at taking over a Ghost website. An attacker could craft a deceptive scenario where a site administrator’s actions are misdirected, potentially allowing the attacker to hijack the administrator’s session and gain unauthorized control of the CMS. This could lead to website defacement, data theft, or the injection of malicious content. For more on the consequences of such breaches, you can review recent incidents in our breach reports.
Remediation and Mitigation
The Ghost development team has released a patch to address this issue. The recommended action is immediate and straightforward.
Primary Action: Update Ghost
- Upgrade your Ghost installation to version 6.19.3 or later. This version contains the necessary fix to properly enforce CSRF protections on the affected endpoint.
- You can find update instructions in the official Ghost documentation.
Verification and Best Practices
- After applying the update, verify that your site is running the patched version.
- As a general security practice, always be cautious of unsolicited emails or links, even when logged into administrative panels, as phishing remains a common attack vector. Staying informed on such tactics is crucial; you can follow the latest developments in our security news section.
No viable workarounds have been published for this specific CSRF flaw, making the update the only complete solution. System administrators should prioritize this patch to protect their sites from potential takeover.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-29784?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and...
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field ma...
OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a secur...
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute ...
Other Node.js Vulnerabilities
`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and...
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field ma...
OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a secur...