
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Ghost CMS through version 5.76.0 is affected by a stored Cross-Site Scripting (XSS) vulnerability that enables privilege escalation. The vulnerability allows a contributor-level user to take over any account through malicious SVG profile pictures containing JavaScript code that interacts with the API on localhost port 3001 (Rhino CVE Details, MITRE CVE).
The vulnerability exists in the SVG file upload handling mechanism of Ghost CMS, specifically affecting profile picture uploads. An authenticated attacker with contributor privileges can upload a specially crafted SVG file containing malicious JavaScript code. When this profile picture is viewed by the Owner of the tenant, it executes the embedded JavaScript, leading to privilege escalation (Rhino CVE Details).
The successful exploitation of this vulnerability allows an attacker with contributor-level access to escalate their privileges to Owner status, effectively gaining complete control over the Ghost CMS instance. This enables full tenant and account takeover capabilities (Rhino CVE Details).
While the vendor initially did not acknowledge this as a valid attack vector, an unofficial patch has been proposed through a pull request (#19646). The patch implements DOMPurify for SVG file sanitization to prevent XSS attacks during file uploads (Ghost PR).
The vulnerability has been marked as DISPUTED in the CVE database, with the vendor initially not viewing it as a valid attack vector. However, security researchers have emphasized its significance, leading to the development of an unofficial patch to address the security concern (MITRE CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”