CVE-2026-28785
Published: 06 March 2026
Summary
CVE-2026-28785 is a critical-severity SQL Injection (CWE-89) vulnerability in Ghostfol Ghostfolio. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validating inputs to the getHistorical() method to block SQL injection via bypassed symbol validation.
Ensures timely remediation of the SQL injection flaw through patching to version 2.244.0 or later.
Provides vulnerability scanning to identify SQL injection issues like CVE-2026-28785 in Ghostfolio prior to exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing Ghostfolio web app (getHistorical method) directly enables remote unauthenticated exploitation for initial access and full database compromise.
NVD Description
Ghostfolio is an open source wealth management software. Prior to version 2.244.0, by bypassing symbol validation, an attacker can execute arbitrary SQL commands via the getHistorical() method, potentially allowing them to read, modify, or delete sensitive financial data for all…
more
users in the database. This issue has been patched in version 2.244.0.
Deeper analysisAI
CVE-2026-28785 is a SQL injection vulnerability (CWE-89) in Ghostfolio, an open source wealth management software. In versions prior to 2.244.0, attackers can bypass symbol validation in the getHistorical() method to execute arbitrary SQL commands, potentially compromising the database.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable remotely over the network with low complexity, no authentication requirements, and no user interaction needed. Unauthenticated attackers can achieve high-impact effects, including reading, modifying, or deleting sensitive financial data for all users in the database.
Ghostfolio has patched this issue in version 2.244.0. Security advisories recommend upgrading to this version or later for mitigation. Additional details are available in the GitHub release notes at https://github.com/ghostfolio/ghostfolio/releases/tag/2.244.0 and the security advisory at https://github.com/ghostfolio/ghostfolio/security/advisories/GHSA-m5cc-7jw5-34xp.
Details
- CWE(s)