CVE-2025-9862
JavaScript vulnerability analysis and mitigation

Overview

A Server-Side Request Forgery (SSRF) vulnerability was discovered in Ghost's oEmbed mechanism, identified as CVE-2025-9862. The vulnerability affects Ghost versions 5.99.0 to 5.130.3 and 6.0.0 to 6.0.8, and was disclosed on September 14, 2025. The vulnerability allows staff users to exfiltrate data from internal systems through the oEmbed bookmark functionality (GitHub Advisory).

Technical details

The vulnerability exists in Ghost's oEmbed mechanism where the system fails to properly validate URLs during the bookmark processing. The issue stems from using native fetch instead of SSRF-hardened externalRequest method when fetching image buffers from URLs. The vulnerability has been assigned a CVSS v4.0 score with a vector string of CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N, indicating moderate severity (6.1) (GitHub Security).

Impact

When exploited, this vulnerability allows staff users to access and exfiltrate data from internal systems that should not be accessible. The vulnerability specifically impacts the confidentiality of subsequent systems while the vulnerable system itself maintains its security properties (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Ghost versions 5.130.4 and 6.0.9. The fix involves replacing the native fetch with the SSRF-hardened externalRequest method and adding an eslint rule to prevent usage of fetch. Users should upgrade to these patched versions to protect against this vulnerability (GitHub Advisory).

Community reactions

The vulnerability was responsibly disclosed by security researcher Cristian Vargas. Ghost's security team acknowledged the finding and promptly released patches to address the vulnerability (GitHub Security).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59145HIGH8.8
  • JavaScriptJavaScript
  • color-name
NoYesSep 15, 2025
CVE-2025-59331HIGH8.8
  • JavaScriptJavaScript
  • is-arrayish
NoYesSep 15, 2025
CVE-2025-59330HIGH8.8
  • JavaScriptJavaScript
  • error-ex
NoYesSep 15, 2025
CVE-2025-59162HIGH8.8
  • JavaScriptJavaScript
  • color-convert
NoYesSep 15, 2025
CVE-2025-9862MEDIUM6.1
  • JavaScriptJavaScript
  • ghost
NoYesSep 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management