-
CVSS Score
-The vulnerability exists in the EventRepository.getAggregatedClickEvents function, located in ghost/core/core/server/services/members/members-api/repositories/EventRepository.js. The analysis of the patch clearly shows that the postId parameter, which is extracted from the filter argument, was used directly in a SQL query string. This allows for SQL injection if a malicious string is passed as the postId. The fix involves a new function, getPostIdFromFilter, which validates the postId as a valid ObjectID before it is used in the query. The vulnerable function getAggregatedClickEvents would appear in a runtime profile during exploitation of this vulnerability.
EventRepository.getAggregatedClickEventsghost/core/core/server/services/members/members-api/repositories/EventRepository.js
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ghost | npm | >= 6.0.0, <= 6.10.3 | 6.11.0 |
| ghost | npm | >= 5.105.0, <= 5.130.5 | 5.130.6 |
A Semantic Attack on Google Gemini - Read the Latest Research