{"id":"CVE-2022-41654","details":"An authentication bypass vulnerability exists in the newsletter subscription functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability.","aliases":["BIT-ghost-2022-41654","GHSA-9gh8-wp53-ccc6"],"modified":"2026-04-10T04:51:56.520947Z","published":"2022-12-22T10:15:10.047Z","related":["GHSA-9gh8-wp53-ccc6"],"references":[{"type":"ADVISORY","url":"https://github.com/TryGhost/Ghost/security/advisories/GHSA-9gh8-wp53-ccc6"},{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1624"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tryghost/ghost","events":[{"introduced":"67c5395a7f50779691beaee28941adc38553f348"},{"fixed":"2034eac6342ad0b206b8cbf826fba39cbcea56ca"},{"introduced":"c001865e7cbd3f5e9846f109c8ab5eb348f120b4"},{"fixed":"96aa0e6ba6b48a292c029ead437c00e30ac073ea"}],"database_specific":{"versions":[{"introduced":"4.46.0"},{"fixed":"4.48.8"},{"introduced":"5.0.0"},{"fixed":"5.22.7"}]}}],"versions":["@tryghost/portal@2.13.2","@tryghost/portal@2.14.0","@tryghost/portal@2.16.0","@tryghost/portal@2.17.0","@tryghost/portal@2.18.0","@tryghost/portal@2.19.3","@tryghost/portal@2.19.5","@tryghost/portal@2.19.6","@tryghost/portal@2.19.7","@tryghost/portal@2.19.8","v4.46.0","v4.46.1","v4.46.2","v4.47.0","v4.47.1","v4.47.2","v4.47.3","v4.47.4","v4.48.0","v4.48.1","v4.48.2","v4.48.3","v4.48.4","v4.48.5","v4.48.6","v4.48.7","v5.0.0","v5.0.1","v5.1.0","v5.1.1","v5.10.0","v5.11.0","v5.12.0","v5.12.1","v5.13.0","v5.14.0","v5.15.0","v5.16.0","v5.17.0","v5.18.0","v5.19.0","v5.2.0","v5.2.1","v5.2.2","v5.2.3","v5.20.0","v5.21.0","v5.22.6","v5.3.0","v5.4.0","v5.5.0","v5.6.0","v5.7.0","v5.7.1","v5.8.0","v5.8.1","v5.8.2","v5.8.3","v5.9.0","v5.9.1","v5.9.2","v5.9.3","v5.9.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-41654.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}