Ghost.CMS.slug.filter.SQL.Injection

description-logoDescription

This indicates an attack attempt to exploit an SQL Injection Vulnerability in Ghost Foundation Ghost.
The vulnerability is due to insufficient sanitization of user-supplied inputs in the application. A remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could lead to arbitrary SQL code execution in the security context of the database service connected to the application.

affected-products-logoAffected Products

Ghost Foundation Ghost prior to 6.19.1

Impact logoImpact

System Compromise: Remote attackers can access or modify data in the database of the affected application.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://github.com/TryGhost/Ghost/security/advisories/GHSA-w52v-v783-gw97

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2026-04-08 36.198
New