← Back to CVEs
CVE-2024-34451
CRITICAL9.1
Description
Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendor's position is that Ghost should be installed with a reverse proxy that allows only trusted X-Forwarded-For headers.
CVE Details
CVSS v3.1 Score9.1
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/16/2024
Last Modified6/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
ghost:ghost
Weaknesses (CWE)
CWE-1390
References
https://ghost.org/docs/faq/proxying-https-infinite-loops/(cve@mitre.org)
https://github.com/TryGhost/Ghost/releases(cve@mitre.org)
https://docs.google.com/document/d/1iy0X4Vc9xXYoBxFrcW6ATo8GKPV6ivuLVzn6GgEpwqE(af854a3a-2127-422b-91ae-364da2661108)
https://ghost.org/docs/faq/proxying-https-infinite-loops/(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/TryGhost/Ghost/releases(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.