A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-22595

CVE-2026-22595: Ghost CMS Auth Bypass Vulnerability

CVE-2026-22595 is an authentication bypass flaw in Ghost CMS affecting versions 5.121.0-5.130.5 and 6.0.0-6.10.3. Staff Token authentication incorrectly allowed access to restricted endpoints. This article covers technical details, affected versions, impact, and mitigation steps.

Updated: January 22, 2026

CVE-2026-22595 Overview

CVE-2026-22595 is an authorization bypass vulnerability in Ghost, a popular Node.js content management system. The vulnerability exists in Ghost's handling of Staff Token authentication, where a trailing slash mismatch in endpoint validation allowed Staff Tokens to access endpoints that were only intended to be accessible via Staff Session authentication. This flaw could allow external systems authenticated via Staff Tokens for Admin/Owner-role users to access restricted administrative endpoints, including database deletion and ownership transfer functions.

Critical Impact

Attackers with Staff Token access for Admin/Owner roles could bypass authorization controls to delete all site content or transfer site ownership by exploiting inconsistent path matching in the authentication middleware.

Affected Products

  • Ghost versions 5.121.0 through 5.130.5
  • Ghost versions 6.0.0 through 6.10.3

Discovery Timeline

  • 2026-01-10 - CVE CVE-2026-22595 published to NVD
  • 2026-01-13 - Last updated in NVD database

Technical Details for CVE-2026-22595

Vulnerability Analysis

This vulnerability is classified under CWE-863 (Incorrect Authorization). The flaw exists in Ghost's admin middleware responsible for restricting Staff Token access to sensitive endpoints. The authorization logic checked for specific paths with trailing slashes (e.g., /db/ and /users/owner/), but Express.js routes accept both trailing-slash and non-trailing-slash variations of URLs. This inconsistency meant that requests to /db or /users/owner (without trailing slashes) would bypass the Staff Token restrictions while still being routed to the same endpoint handlers.

The vulnerability is exploitable over the network and requires low privileges (a valid Staff Token with Admin or Owner role), but no user interaction is needed to exploit it.

Root Cause

The root cause is improper path matching in the authorization middleware. The original code only checked for paths with trailing slashes when determining if a Staff Token was attempting to access blocked endpoints. Since Express.js normalizes routes and accepts both /db/ and /db as equivalent paths, attackers could bypass the authorization check simply by omitting the trailing slash from their requests.

Attack Vector

An attacker with a Staff Token associated with an Admin or Owner role could craft HTTP requests to restricted endpoints without trailing slashes. For example:

  • DELETE /db instead of DELETE /db/ to delete all site content
  • PUT /users/owner instead of PUT /users/owner/ to transfer site ownership

These requests would pass the Staff Token authorization checks while still reaching the intended (and dangerous) endpoint handlers.

javascript
// Vulnerable code - only checked trailing slash paths
// Source: https://github.com/TryGhost/Ghost/commit/9513d2a35c21067127ce8192443d8919ddcefcc8
    // Staff tokens have a user_id associated with them, integration tokens don't
    if (req.api_key?.get('user_id')) {
        // Check if staff token is trying to access blocked endpoints
-        const isDeleteAllContent = req.method === 'DELETE' && req.path === '/db/';
-        const isTransferOwnership = req.method === 'PUT' && req.path === '/users/owner/';
+        // Match both with and without trailing slash since Express routes accept both
+        const isDeleteAllContent = req.method === 'DELETE' && (req.path === '/db/' || req.path === '/db');
+        const isTransferOwnership = req.method === 'PUT' && (req.path === '/users/owner/' || req.path === '/users/owner');

        if (isDeleteAllContent || isTransferOwnership) {
            return next(new errors.NoPermissionError({

Detection Methods for CVE-2026-22595

Indicators of Compromise

  • Unexpected DELETE requests to /ghost/api/admin/db or /ghost/api/admin/db/ endpoints
  • Unusual PUT requests to /ghost/api/admin/users/owner or /ghost/api/admin/users/owner/ endpoints
  • Staff Token authentication (API key with associated user_id) being used to access these restricted endpoints
  • Sudden loss of site content or unexpected ownership changes in Ghost instances

Detection Strategies

  • Monitor web server access logs for DELETE requests targeting /db or /db/ paths in the Ghost admin API
  • Alert on PUT requests to /users/owner paths, especially when authenticated via API tokens rather than session cookies
  • Implement web application firewall rules to flag requests to sensitive Ghost admin endpoints that bypass normal session authentication
  • Review Ghost audit logs for database deletion or ownership transfer actions performed via Staff Tokens

Monitoring Recommendations

  • Enable verbose logging for Ghost admin API endpoints to capture authentication method used (Staff Token vs Session)
  • Set up alerts for any successful requests to /ghost/api/admin/db and /ghost/api/admin/users/owner paths regardless of trailing slash
  • Monitor for patterns of API requests with subtle URL variations targeting the same endpoints
  • Periodically audit active Staff Tokens and their associated permissions to identify over-privileged tokens

How to Mitigate CVE-2026-22595

Immediate Actions Required

  • Upgrade Ghost to version 5.130.6 or 6.11.0 immediately
  • Audit existing Staff Tokens and revoke any that are not actively needed
  • Review Ghost access logs for any suspicious activity targeting /db or /users/owner endpoints
  • Temporarily disable Staff Token access if immediate patching is not possible

Patch Information

Ghost has released patched versions that address this vulnerability. The fix ensures that both trailing-slash and non-trailing-slash variations of restricted paths are blocked for Staff Token authentication:

  • Version 5.130.6 - Patched for 5.x branch users (Commit 9513d2a)
  • Version 6.11.0 - Patched for 6.x branch users (Commit c3017f8)

For full details, see the GitHub Security Advisory GHSA-9xg7-mwmp-xmjx.

Workarounds

  • Revoke all Staff Tokens for Admin and Owner role users until patching is complete
  • Implement network-level restrictions to block external access to the Ghost Admin API
  • Use a reverse proxy or WAF to block DELETE requests to paths containing /db and PUT requests to paths containing /users/owner
  • Restrict Staff Token usage to only necessary integrations and prefer Session-based authentication for administrative tasks
bash
# Example: Block vulnerable endpoints at nginx reverse proxy level
location ~ ^/ghost/api/(v[0-9]+/)?admin/db/?$ {
    if ($request_method = DELETE) {
        return 403;
    }
}

location ~ ^/ghost/api/(v[0-9]+/)?admin/users/owner/?$ {
    if ($request_method = PUT) {
        return 403;
    }
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechGhost

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-863
  • Technical References
  • GitHub Commit Update

  • GitHub Commit Update

  • GitHub Security Advisory GHSA-9xg7-mwmp-xmjx
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use