CVE-2026-29053
Published: 05 March 2026
Summary
CVE-2026-29053 is a high-severity Injection (CWE-74) vulnerability in Ghost Ghost. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 7.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Developer assessments and testing (including injection-focused techniques) identify improper neutralization of special elements, and the verifiable flaw remediation corrects them pre-deployment.
Identifies indicators of injection attacks (command, SQL, LDAP, etc.) via anomaly and attack monitoring.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
RCE via crafted malicious theme upload in public-facing Node.js CMS (Ghost) directly enables T1190 for initial server compromise and T1059.007 for JavaScript-based arbitrary code execution.
NVD Description
Ghost is a Node.js content management system. From version 0.7.2 to 6.19.0, specifically crafted malicious themes can execute arbitrary code on the server running Ghost. This issue has been patched in version 6.19.1.
Deeper analysisAI
CVE-2026-29053 is an arbitrary code execution vulnerability affecting Ghost, a Node.js content management system. The flaw exists in versions 0.7.2 through 6.19.0, where specifically crafted malicious themes can execute arbitrary code on the server running Ghost. It is classified under CWE-74 (Injection) with a CVSS v3.1 base score of 7.6 (AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H), indicating high severity due to its potential impact across confidentiality, integrity, and availability.
Exploitation requires a high-privilege user, such as an administrator, to interact with a malicious theme, likely by uploading or installing it via the Ghost admin interface over a network connection. The high attack complexity and user interaction prerequisites limit feasibility, but successful exploitation grants attackers a scope change with server-side code execution privileges, enabling full compromise of the hosting environment.
The issue has been addressed in Ghost version 6.19.1. Additional details on the vulnerability and patch are available in the GitHub Security Advisory at https://github.com/TryGhost/Ghost/security/advisories/GHSA-cgc2-rcrh-qr5x. Security practitioners should upgrade to the patched version and review theme sources for any signs of compromise.
Details
- CWE(s)