CVE-2026-22595
Published: 10 January 2026
Summary
CVE-2026-22595 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Ghost Ghost. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations to prevent Staff Token authentication from bypassing restrictions intended for Staff Session authentication only.
Limits privileges associated with Staff Tokens to only those necessary, mitigating unauthorized access to session-restricted endpoints.
Requires timely remediation of flaws like the authorization bypass in Ghost versions 5.121.0-5.130.5 and 6.0.0-6.10.3 via patching to 5.130.6 or 6.11.0.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Auth bypass in public-facing Ghost CMS directly enables T1190 (exploiting the web app over network) and T1068 (escalating from low-priv Staff Token to high-integrity/availability admin endpoints).
NVD Description
Ghost is a Node.js content management system. In versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's handling of Staff Token authentication allowed certain endpoints to be accessed that were only intended to be accessible via Staff…
more
Session authentication. External systems that have been authenticated via Staff Tokens for Admin/Owner-role users would have had access to these endpoints. This issue has been patched in versions 5.130.6 and 6.11.0.
Deeper analysisAI
CVE-2026-22595 is an authorization bypass vulnerability (CWE-863) affecting Ghost, a Node.js content management system. The issue exists in versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3 due to improper handling of Staff Token authentication, which permitted access to endpoints intended exclusively for Staff Session authentication.
An attacker with low privileges (PR:L) who possesses a valid Staff Token for an Admin or Owner role user can exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). External systems authenticated via such tokens gain unauthorized access to the restricted endpoints, potentially enabling high integrity (I:H) and availability (A:H) impacts, as scored at CVSS 8.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).
Ghost security advisories and patch commits confirm the issue has been addressed in versions 5.130.6 and 6.11.0. Security practitioners should upgrade affected Ghost installations to these patched versions to mitigate the vulnerability, with details available in the GitHub security advisory (GHSA-9xg7-mwmp-xmjx) and related commits.
Details
- CWE(s)