CVE-2026-22596
Published: 10 January 2026
Summary
CVE-2026-22596 is a medium-severity SQL Injection (CWE-89) vulnerability in Ghost Ghost. Its CVSS base score is 6.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing Ghost Admin API endpoint directly matches exploitation of web application flaws for arbitrary query execution and data impact.
NVD Description
Ghost is a Node.js content management system. In versions 5.90.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's /ghost/api/admin/members/events endpoint allows users with authentication credentials for the Admin API to execute arbitrary SQL. This issue has been patched…
more
in versions 5.130.6 and 6.11.0.
Deeper analysisAI
CVE-2026-22596 is a SQL injection vulnerability (CWE-89) in Ghost, a Node.js content management system. The flaw affects versions 5.90.0 through 5.130.5 and 6.0.0 through 6.10.3, specifically in the /ghost/api/admin/members/events endpoint of the Admin API. It enables arbitrary SQL execution when the endpoint processes untrusted input from authenticated requests.
Attackers require valid authentication credentials for the Ghost Admin API, corresponding to high privileges (PR:H) as per the CVSS v3.1 base score of 6.7 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L). Exploitation occurs over the network with low complexity and no user interaction. Successful attacks allow high-impact confidentiality and integrity violations, such as data exfiltration or modification, alongside low availability disruption.
Ghost has addressed the issue in patched versions 5.130.6 and 6.11.0. The official security advisory (GHSA-gjrp-xgmh-x9qq) and related commits detail the fixes, recommending immediate upgrades for affected installations.
Details
- CWE(s)