Incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might have made it easier for phishers to take over a Ghost site.
This vulnerability is present in Ghost from v5.101.6 up to v6.19.2.
v6.19.3 contains a fix for this issue.
For self-hosters using Docker, find Docker's official Ghost image here. Updating a Docker-based Ghost instance is documented here.
If a project's Ghost is a Ghost-CLI install see the documentation on updating it to the latest version here.
If there are any questions or comments about this advisory, send an email to security@ghost.org.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-352"
],
"nvd_published_at": "2026-03-07T16:15:55Z",
"github_reviewed_at": "2026-03-05T00:42:55Z",
"severity": "HIGH"
}