CVE-2024-34451

Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendor's position is that Ghost should be installed with a reverse proxy that allows only trusted X-Forwarded-For headers.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*

History

20 Jun 2025, 18:06

Type Values Removed Values Added
First Time Ghost
Ghost ghost
CPE cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*
References () https://docs.google.com/document/d/1iy0X4Vc9xXYoBxFrcW6ATo8GKPV6ivuLVzn6GgEpwqE - () https://docs.google.com/document/d/1iy0X4Vc9xXYoBxFrcW6ATo8GKPV6ivuLVzn6GgEpwqE - Exploit
References () https://ghost.org/docs/faq/proxying-https-infinite-loops/ - () https://ghost.org/docs/faq/proxying-https-infinite-loops/ - Product
References () https://github.com/TryGhost/Ghost/releases - () https://github.com/TryGhost/Ghost/releases - Product

16 Jun 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-16 22:15

Updated : 2025-06-20 18:06


NVD link : CVE-2024-34451

Mitre link : CVE-2024-34451


JSON object : View

Products Affected

ghost

  • ghost
CWE

No CWE.