CVE Vulnerabilities

CVE-2024-34451

Weak Authentication

Published: Jun 16, 2024 | Modified: Jun 20, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io minimus.io echohq.com

Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendors position is that Ghost should be installed with a reverse proxy that allows only trusted X-Forwarded-For headers.

Weakness

The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct.

Affected Software

Name Vendor Start Version End Version
Ghost Ghost * 5.85.1 (including)

Extended Description

Attackers may be able to bypass weak authentication faster and/or with less effort than expected.

References