CVE-2026-29784
Published: 07 March 2026
Summary
CVE-2026-29784 is a high-severity CSRF (CWE-352) vulnerability in Ghost Ghost. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Awareness training educates users on avoiding untrusted links and actions that can be exploited via CSRF.
Requiring user re-entry of credentials for sensitive actions prevents automated forgery of requests without active user participation.
Security testing regimens explicitly include checks for missing or ineffective anti-CSRF protections in web applications.
Detects anomalous request patterns consistent with cross-site request forgery.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CSRF flaw in public-facing Ghost /session/verify directly enables browser session hijacking (T1185) by allowing OTC/session reuse across logins; exploitation occurs against internet-facing web app (T1190) via phishing-delivered malicious interaction.
NVD Description
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might have made it easier…
more
for phishers to take over a Ghost site. This issue has been patched in version 6.19.3.
Deeper analysisAI
CVE-2026-29784 is a cross-site request forgery (CSRF) vulnerability, classified under CWE-352, affecting Ghost, a Node.js content management system. The issue stems from incomplete CSRF protections around the /session/verify endpoint in versions 5.101.6 through 6.19.2. This flaw allows one-time codes (OTCs) intended for one login session to be used in a different session, with a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H).
Remote unauthenticated attackers can exploit this vulnerability by tricking authenticated users into interacting with a malicious site or resource, such as through phishing. The high attack complexity and required user interaction enable phishers in certain scenarios to hijack login sessions and take over a Ghost site, potentially leading to high-impact confidentiality, integrity, and availability compromises.
The Ghost security advisory (GHSA-9m84-wc28-w895) and associated patch commit detail mitigation through updates to version 6.19.3, which addresses the incomplete CSRF protections in the /session/verify endpoint. Security practitioners should upgrade affected Ghost instances immediately and review configurations for proper CSRF token handling.
Details
- CWE(s)