CVE-2022-47197
NixOS vulnerability analysis and mitigation

Overview

Ghost Foundation Ghost 5.9.4 contains an insecure default vulnerability (CVE-2022-47197) in its Post Creation functionality. The vulnerability was discovered in December 2022 and publicly disclosed on January 19, 2023. The issue affects default installations of Ghost CMS, specifically version 5.9.4, allowing non-administrator users to inject arbitrary JavaScript in posts, which can lead to privilege escalation to administrator via XSS (Talos Report).

Technical details

The vulnerability exists in the codeinjection_foot field for posts. When exploited, an attacker can send an HTTP request to inject JavaScript in a post to trick an administrator into visiting the post. The vulnerability has been assigned a CVSS v3.0 score of 9.0 (CRITICAL) with the vector string CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H. The issue is classified under CWE-453 (Insecure Default Variable Initialization) (Talos Report, NVD).

Impact

The vulnerability allows non-administrator users to effectively gain administrator privileges through XSS attacks. In default installations of Ghost CMS, this means that users who can author pages essentially have the same privileges as administrator users. The attack can be triggered when a higher-level user previews or visits any post by the malicious user (Talos Report).

Mitigation and workarounds

The primary mitigation is to separate the admin domain as documented at ghost.org/docs/config/#admin-url. This separation will prevent the vulnerability from being exploited to perform privileged API calls, such as modifying user groups or adding users. However, this is not enabled in default installations (Talos Report).

Community reactions

Notably, there was some disagreement between the security researchers and the vendor regarding the severity of this issue. According to the timeline, the vendor initially did not consider the issue a security problem when contacted in October 2022, and maintained this position through January 2023, even after receiving a revised advisory (Talos Report).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • rhel10::firefox-flatpak
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14332HIGH7.3
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • rhel10::thunderbird-flatpak
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management