Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.
No PoCs from references.
- https://github.com/137f/Ghost-CMS-5.42.1---Path-Traversal
- https://github.com/AXRoux/Ghost-Path-Traversal-CVE-2023-32235-
- https://github.com/VEEXH/Ghost-Path-Traversal-CVE-2023-32235-
- https://github.com/ibrahmsql/Ghostscan
- https://github.com/nomi-sec/PoC-in-GitHub