Cyber Posture

CVE-2026-29784

High

Published: 07 March 2026

Published
07 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-29784 is a high-severity CSRF (CWE-352) vulnerability in Ghost Ghost. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-352

Awareness training educates users on avoiding untrusted links and actions that can be exploited via CSRF.

addresses: CWE-352

Requiring user re-entry of credentials for sensitive actions prevents automated forgery of requests without active user participation.

addresses: CWE-352

Security testing regimens explicitly include checks for missing or ineffective anti-CSRF protections in web applications.

addresses: CWE-352

Detects anomalous request patterns consistent with cross-site request forgery.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

CSRF flaw in public-facing Ghost /session/verify directly enables browser session hijacking (T1185) by allowing OTC/session reuse across logins; exploitation occurs against internet-facing web app (T1190) via phishing-delivered malicious interaction.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might have made it easier…

more

for phishers to take over a Ghost site. This issue has been patched in version 6.19.3.

Deeper analysisAI

CVE-2026-29784 is a cross-site request forgery (CSRF) vulnerability, classified under CWE-352, affecting Ghost, a Node.js content management system. The issue stems from incomplete CSRF protections around the /session/verify endpoint in versions 5.101.6 through 6.19.2. This flaw allows one-time codes (OTCs) intended for one login session to be used in a different session, with a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H).

Remote unauthenticated attackers can exploit this vulnerability by tricking authenticated users into interacting with a malicious site or resource, such as through phishing. The high attack complexity and required user interaction enable phishers in certain scenarios to hijack login sessions and take over a Ghost site, potentially leading to high-impact confidentiality, integrity, and availability compromises.

The Ghost security advisory (GHSA-9m84-wc28-w895) and associated patch commit detail mitigation through updates to version 6.19.3, which addresses the incomplete CSRF protections in the /session/verify endpoint. Security practitioners should upgrade affected Ghost instances immediately and review configurations for proper CSRF token handling.

Details

CWE(s)

Affected Products

ghost
ghost
5.101.6 — 6.19.3

CVEs Like This One

CVE-2026-22596Same product: Ghost Ghost
CVE-2026-22594Same product: Ghost Ghost
CVE-2026-26980Same product: Ghost Ghost
CVE-2026-22595Same product: Ghost Ghost
CVE-2026-29053Same product: Ghost Ghost
CVE-2026-24778Same product: Ghost Ghost
CVE-2025-30564Shared CWE-352
CVE-2025-26759Shared CWE-352
CVE-2025-28923Shared CWE-352
CVE-2025-22690Shared CWE-352

References