High (7.5)

CVE-2026-29784: Ghost CSRF — Patch Guide

CVE-2026-29784

Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the reque...

Affected: Node.js

Overview

A security vulnerability has been identified in Ghost, a popular Node.js-based content management system. This flaw, tracked as CVE-2026-29784, involves incomplete Cross-Site Request Forgery (CSRF) protections. It affects Ghost versions from 5.101.6 up to, but not including, version 6.19.3. The vulnerability has been assigned a HIGH severity rating with a CVSS score of 7.5.

Vulnerability Explained

In simple terms, this vulnerability exists in the session verification endpoint (/session/verify). Due to insufficient CSRF safeguards, a One-Time Code (OTC) used for login could potentially be validated in a different user session than the one intended. This weakness could be exploited by an attacker who tricks an authenticated Ghost administrator into performing an unwanted action, such as clicking a malicious link.

Potential Impact

The primary risk is that this flaw could facilitate phishing attacks aimed at taking over a Ghost website. An attacker could craft a deceptive scenario where a site administrator’s actions are misdirected, potentially allowing the attacker to hijack the administrator’s session and gain unauthorized control of the CMS. This could lead to website defacement, data theft, or the injection of malicious content. For more on the consequences of such breaches, you can review recent incidents in our breach reports.

Remediation and Mitigation

The Ghost development team has released a patch to address this issue. The recommended action is immediate and straightforward.

Primary Action: Update Ghost

  • Upgrade your Ghost installation to version 6.19.3 or later. This version contains the necessary fix to properly enforce CSRF protections on the affected endpoint.
  • You can find update instructions in the official Ghost documentation.

Verification and Best Practices

  • After applying the update, verify that your site is running the patched version.
  • As a general security practice, always be cautious of unsolicited emails or links, even when logged into administrative panels, as phishing remains a common attack vector. Staying informed on such tactics is crucial; you can follow the latest developments in our security news section.

No viable workarounds have been published for this specific CSRF flaw, making the update the only complete solution. System administrators should prioritize this patch to protect their sites from potential takeover.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-29784?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Other Node.js Vulnerabilities

View all Node.js vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.