GHSA-f7qg-xj45-w956

Suggest an improvement
Source
https://github.com/advisories/GHSA-f7qg-xj45-w956
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-f7qg-xj45-w956/GHSA-f7qg-xj45-w956.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-f7qg-xj45-w956
Aliases
Published
2025-09-15T20:31:14Z
Modified
2026-01-29T21:26:14.741276Z
Severity
  • 6.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N CVSS Calculator
Summary
Ghost vulnerable to Server Side Request Forgery (SSRF) via oEmbed Bookmark
Details

Impact

A vulnerability in Ghost's oEmbed mechanism allows staff users to exfiltrate data from internal systems via SSRF.

Vulnerable versions

This vulnerability is present in Ghost v5.99.0 to v5.130.3 to and Ghost v6.0.0 to v6.0.8.

Patches

v5.130.4 and v6.0.9 contain a fix for this issue.

References

The original report is available here: https://fluidattacks.com/advisories/regida

We thank Cristian Vargas for discovering and disclosing this vulnerability responsibly.

For more information

If you have any questions or comments about this advisory, email us at security@ghost.org.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2025-09-15T20:31:14Z",
    "cwe_ids": [
        "CWE-918"
    ],
    "severity": "MODERATE",
    "nvd_published_at": "2025-09-17T15:15:43Z"
}
References

Affected packages

npm / ghost

Package

Affected ranges

Type
SEMVER
Events
Introduced
6.0.0
Fixed
6.0.9

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-f7qg-xj45-w956/GHSA-f7qg-xj45-w956.json"
last_known_affected_version_range
"<= 6.0.8"

npm / ghost

Package

Affected ranges

Type
SEMVER
Events
Introduced
5.99.0
Fixed
5.130.4

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-f7qg-xj45-w956/GHSA-f7qg-xj45-w956.json"
last_known_affected_version_range
"<= 5.130.3"