Ghost(Pro) has already been patched. Maintainers can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version below v5.46.1. v5.46.1 contains a fix for this issue. As a workaround, add a block for requests to `/ghost/api/content/*` where the `filter` query parameter contains `password` or `email`.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r97q-ghch-82j9 | Ghost vulnerable to information disclosure of private API fields |
Wed, 29 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-29T14:53:24.054Z
Reserved: 2023-04-24T21:44:10.416Z
Link: CVE-2023-31133
Updated: 2024-08-02T14:45:25.764Z
Status : Modified
Published: 2023-05-08T21:15:11.600
Modified: 2024-11-21T08:01:27.613
Link: CVE-2023-31133
No data.
OpenCVE Enrichment
No data.
Github GHSA