Cyber Posture

CVE-2026-22595

High

Published: 10 January 2026

Published
10 January 2026
Modified
15 January 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0004 10.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22595 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Ghost Ghost. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations to prevent Staff Token authentication from bypassing restrictions intended for Staff Session authentication only.

prevent

Limits privileges associated with Staff Tokens to only those necessary, mitigating unauthorized access to session-restricted endpoints.

prevent

Requires timely remediation of flaws like the authorization bypass in Ghost versions 5.121.0-5.130.5 and 6.0.0-6.10.3 via patching to 5.130.6 or 6.11.0.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Auth bypass in public-facing Ghost CMS directly enables T1190 (exploiting the web app over network) and T1068 (escalating from low-priv Staff Token to high-integrity/availability admin endpoints).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Ghost is a Node.js content management system. In versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's handling of Staff Token authentication allowed certain endpoints to be accessed that were only intended to be accessible via Staff…

more

Session authentication. External systems that have been authenticated via Staff Tokens for Admin/Owner-role users would have had access to these endpoints. This issue has been patched in versions 5.130.6 and 6.11.0.

Deeper analysisAI

CVE-2026-22595 is an authorization bypass vulnerability (CWE-863) affecting Ghost, a Node.js content management system. The issue exists in versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3 due to improper handling of Staff Token authentication, which permitted access to endpoints intended exclusively for Staff Session authentication.

An attacker with low privileges (PR:L) who possesses a valid Staff Token for an Admin or Owner role user can exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). External systems authenticated via such tokens gain unauthorized access to the restricted endpoints, potentially enabling high integrity (I:H) and availability (A:H) impacts, as scored at CVSS 8.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).

Ghost security advisories and patch commits confirm the issue has been addressed in versions 5.130.6 and 6.11.0. Security practitioners should upgrade affected Ghost installations to these patched versions to mitigate the vulnerability, with details available in the GitHub security advisory (GHSA-9xg7-mwmp-xmjx) and related commits.

Details

CWE(s)

Affected Products

ghost
ghost
5.121.0 — 5.130.6 · 6.0.0 — 6.11.0

CVEs Like This One

CVE-2026-22594Same product: Ghost Ghost
CVE-2026-22596Same product: Ghost Ghost
CVE-2026-29053Same product: Ghost Ghost
CVE-2026-26980Same product: Ghost Ghost
CVE-2026-29784Same product: Ghost Ghost
CVE-2026-24778Same product: Ghost Ghost
CVE-2025-30093Shared CWE-863
CVE-2026-41191Shared CWE-863
CVE-2026-32101Shared CWE-863
CVE-2026-32267Shared CWE-863

References