A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-32235

CVE-2023-32235: Ghost Path Traversal Vulnerability

CVE-2023-32235 is a path traversal vulnerability in Ghost that allows attackers to read arbitrary files within the active theme's folder. This article covers technical details, affected versions, impact, and mitigation.

Published: February 4, 2026

CVE-2023-32235 Overview

CVE-2023-32235 is a path traversal vulnerability affecting Ghost CMS versions prior to 5.42.1. This vulnerability allows remote attackers to read arbitrary files within the active theme's folder by exploiting improper path handling in the static theme middleware. The attack leverages URL-encoded directory traversal sequences (/assets/built%2F..%2F..%2F/) to bypass path restrictions and access sensitive files that should not be publicly accessible.

Critical Impact

Remote attackers can read arbitrary files within the active theme's folder without authentication, potentially exposing sensitive configuration files, custom templates, and theme-specific data stored within Ghost CMS themes.

Affected Products

  • Ghost CMS versions prior to 5.42.1
  • Ghost CMS for Node.js (all platforms)
  • Self-hosted Ghost installations using vulnerable theme middleware

Discovery Timeline

  • 2023-05-05 - CVE-2023-32235 published to NVD
  • 2025-01-29 - Last updated in NVD database

Technical Details for CVE-2023-32235

Vulnerability Analysis

This path traversal vulnerability (CWE-22) exists in Ghost CMS's static theme file serving middleware, specifically located in frontend/web/middleware/static-theme.js. The vulnerability stems from insufficient input validation when processing URL-encoded path segments in file requests.

When a user requests a static asset from a Ghost theme, the middleware processes the file path without properly decoding and validating URL-encoded characters before checking for directory traversal attempts. An attacker can use encoded path separators like %2F (which decodes to /) combined with .. sequences to escape the intended /assets/built/ directory and access other files within the theme folder.

The attack is particularly effective because the path validation occurs before URL decoding, allowing the encoded traversal sequences to bypass security checks. Once the path reaches the file system, the encoded characters are decoded, resulting in actual directory traversal.

Root Cause

The root cause of this vulnerability is the improper order of operations in path validation. The middleware checks for directory traversal patterns on the raw URL-encoded input rather than first decoding the URL components. This allows attackers to evade pattern matching by encoding special characters like forward slashes (/ → %2F) and periods.

The vulnerable code path fails to call decodeURIComponent() on the file path before performing security validations, creating a classic URL encoding bypass scenario common in path traversal vulnerabilities.

Attack Vector

The attack can be executed remotely over the network without authentication. An attacker crafts a malicious HTTP request to the Ghost CMS server using URL-encoded directory traversal sequences:

GET /assets/built%2F..%2F..%2Fpartials%2Fdefault.hbs HTTP/1.1
Host: vulnerable-ghost-site.com

This request appears to target the /assets/built/ directory but after URL decoding resolves to /assets/built/../../partials/default.hbs, which traverses up from the built assets folder and accesses other theme files.

The security patch implements proper URL decoding before path validation:

javascript
     return deniedFiles.includes(base) || deniedFileTypes.includes(ext);
 }
 
+/**
+ * Copy from:
+ * https://github.com/pillarjs/send/blob/b69cbb3dc4c09c37917d08a4c13fcd1bac97ade5/index.js#L987-L1003
+ *
+ * Allows V8 to only deoptimize this fn instead of all
+ * of send().
+ *
+ * @param {string} filePath
+ * @returns {string|number} returns -1 number if decode decodeURIComponent throws
+ */
+function decode(filePath) {
+    try {
+        return decodeURIComponent(filePath);
+    } catch (err) {
+        return -1;
+    }
+}
+
+/**
+ *
+ * @param {string} file path to a requested file
+ * @returns {boolean}
+ */
 function isAllowedFile(file) {
+    const decodedFilePath = decode(file);
+    if (decodedFilePath === -1) {
+        return false;

Source: GitHub Commit Update

Detection Methods for CVE-2023-32235

Indicators of Compromise

  • HTTP requests containing URL-encoded path traversal sequences like %2F..%2F or %2F..%2F..%2F targeting /assets/ endpoints
  • Unusual access patterns to theme files outside the /assets/built/ directory
  • Web server logs showing requests with encoded directory traversal patterns
  • Abnormal file access attempts logged by the Ghost CMS application

Detection Strategies

  • Implement web application firewall (WAF) rules to detect URL-encoded path traversal attempts in request URIs
  • Monitor HTTP access logs for requests containing %2F..%2F sequences targeting static asset endpoints
  • Deploy intrusion detection system (IDS) signatures for encoded directory traversal patterns
  • Enable verbose logging in Ghost CMS to capture suspicious file access requests

Monitoring Recommendations

  • Configure log aggregation to alert on requests containing encoded traversal sequences
  • Monitor Ghost CMS theme folder access patterns for anomalous file reads
  • Implement rate limiting on asset requests to slow potential automated scanning
  • Review web server access logs periodically for path traversal attack signatures

How to Mitigate CVE-2023-32235

Immediate Actions Required

  • Upgrade Ghost CMS to version 5.42.1 or later immediately
  • Review web server logs for evidence of exploitation attempts using encoded path traversal
  • Audit theme folder contents to identify any sensitive files that may have been exposed
  • Implement WAF rules to block URL-encoded path traversal attempts as an interim measure

Patch Information

The Ghost development team has released version 5.42.1 which addresses this vulnerability. The fix implements proper URL decoding of file paths before performing path validation checks, preventing the bypass of security controls through encoding tricks.

Upgrade using the Ghost-CLI tool:

bash
ghost update

For detailed changes between the vulnerable and patched versions, see the GitHub Version Comparison.

Workarounds

  • Deploy a reverse proxy or WAF configured to decode and inspect URLs before forwarding to Ghost CMS
  • Implement URL normalization rules at the web server level to reject requests containing encoded traversal sequences
  • Restrict direct access to the Ghost application by using a CDN with built-in path traversal protections
  • Consider temporarily disabling custom themes and using default themes until patching is complete
bash
# Nginx configuration to block encoded path traversal
location /assets/ {
    # Decode and check for traversal attempts
    if ($request_uri ~* "%2[fF]\.\.%2[fF]") {
        return 403;
    }
    # Additional path normalization
    rewrite ^/assets/(.*)$ /assets/$1 break;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechGhost

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability93.98%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-22
  • Technical References
  • GitHub Version Comparison
  • Vendor Resources
  • GitHub Commit Update
  • Related CVEs
  • CVE-2026-24778

  • CVE-2026-22597

  • CVE-2026-22596

  • CVE-2026-22595

  • CVE-2026-22594

  • CVE-2024-43409
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use