CVE-2024-34451

Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendor's position is that Ghost should be installed with a reverse proxy that allows only trusted X-Forwarded-For headers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*

History

20 Jun 2025, 18:06

Type Values Removed Values Added
First Time Ghost
Ghost ghost
References () https://docs.google.com/document/d/1iy0X4Vc9xXYoBxFrcW6ATo8GKPV6ivuLVzn6GgEpwqE - () https://docs.google.com/document/d/1iy0X4Vc9xXYoBxFrcW6ATo8GKPV6ivuLVzn6GgEpwqE - Exploit
References () https://ghost.org/docs/faq/proxying-https-infinite-loops/ - () https://ghost.org/docs/faq/proxying-https-infinite-loops/ - Product
References () https://github.com/TryGhost/Ghost/releases - () https://github.com/TryGhost/Ghost/releases - Product
CPE cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*

Information

Published : 2024-06-16 22:15

Updated : 2025-06-20 18:06


NVD link : CVE-2024-34451

Mitre link : CVE-2024-34451

CVE.ORG link : CVE-2024-34451


JSON object : View

Products Affected

ghost

  • ghost
CWE
CWE-1390

Weak Authentication