Ghost through 5.76.0 allows stored XSS, and resultant privilege escalation in which a contributor can take over any account, via an SVG profile picture that contains JavaScript code to interact with the API on localhost TCP port 3001. NOTE: The discoverer reports that "The vendor does not view this as a valid vector."
https://rhinosecuritylabs.com/blog/
https://github.com/TryGhost/Ghost/pull/19646
https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724