| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x597-9fr4-5857 | Hugo's Node tool execution allows file system access outside the project directory |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gohugo
Gohugo hugo |
|
| Vendors & Products |
Gohugo
Gohugo hugo |
Tue, 12 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hugo is a static site generator. From 0.43 to before 0.161.0, when building a Hugo site that uses Node-based asset pipelines (PostCSS, Babel, TailwindCSS), Hugo invoked the configured Node tools without restrictions on file system access. As a result, executing hugo against an untrusted site could allow code running through these tools to read or write files outside the project's working directory. Users who do not use PostCSS, Babel, or TailwindCSS, or who only build trusted sites, are not affected. This vulnerability is fixed in 0.161.0. | |
| Title | Hugo: Node tool execution allows file system access outside the project directory | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T12:13:13.152Z
Reserved: 2026-05-05T17:39:31.113Z
Link: CVE-2026-44301
Updated: 2026-05-13T12:13:01.470Z
Status : Awaiting Analysis
Published: 2026-05-12T22:16:36.843
Modified: 2026-05-13T18:14:48.583
Link: CVE-2026-44301
No data.
OpenCVE Enrichment
Updated: 2026-05-13T09:45:09Z
Github GHSA