Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gjrp-xgmh-x9qq | Ghost has SQL Injection in Members Activity Feed |
Thu, 15 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:* |
Mon, 12 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ghost
Ghost ghost |
|
| Vendors & Products |
Ghost
Ghost ghost |
Sat, 10 Jan 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ghost is a Node.js content management system. In versions 5.90.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's /ghost/api/admin/members/events endpoint allows users with authentication credentials for the Admin API to execute arbitrary SQL. This issue has been patched in versions 5.130.6 and 6.11.0. | |
| Title | Ghost has SQL Injection in Members Activity Feed | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-12T17:37:41.086Z
Reserved: 2026-01-07T21:50:39.532Z
Link: CVE-2026-22596
Updated: 2026-01-12T17:37:36.940Z
Status : Analyzed
Published: 2026-01-10T03:15:50.703
Modified: 2026-01-15T18:35:34.103
Link: CVE-2026-22596
No data.
OpenCVE Enrichment
Updated: 2026-04-18T07:15:25Z
Github GHSA