Description
Hugo is a static site generator. From 0.43 to before 0.161.0, when building a Hugo site that uses Node-based asset pipelines (PostCSS, Babel, TailwindCSS), Hugo invoked the configured Node tools without restrictions on file system access. As a result, executing hugo against an untrusted site could allow code running through these tools to read or write files outside the project's working directory. Users who do not use PostCSS, Babel, or TailwindCSS, or who only build trusted sites, are not affected. This vulnerability is fixed in 0.161.0.
Published: 2026-05-12
Score: 6.2 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

From version 0.43 up to, but not including, 0.161.0, Hugo built sites that use Node‑based asset pipelines (PostCSS, Babel, and TailwindCSS) executed the configured Node tools without any restriction on file system access. Consequently, running the Hugo build process against a site that incorporates untrusted content could allow the code executed by those Node tools to read or modify any file that the build user can access, including files outside the project’s working directory. The weakness is a classic directory traversal issue documented as CWE‑22, exposing the host system to arbitrary file read or write operations that could compromise confidentiality, integrity, or availability.

Affected Systems

The vulnerability is present in Hugo versions from 0.43 up to, but not including, 0.161.0. The affected product is the Hugo static site generator provided by the gohugoio organization. Users who do not incorporate Node‑based pipelines such as PostCSS, Babel, or TailwindCSS, or who only build sites that originate from trusted sources, are effectively not impacted.

Risk and Exploitability

With a CVSS score of 6.2 the flaw represents a moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating no publicly known, widespread exploitation at this time. The likely attack path consists of deploying or building a Hugo site that incorporates untrusted source content and employs the vulnerable asset pipeline. When Hugo processes such a site, the Node tools execute without sandboxing and can read or write any file the build process user can access, allowing potential data theft or code injection into the host’s environment.

Generated by OpenCVE AI on May 13, 2026 at 00:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Hugo 0.161.0 or later, which removes the unrestricted Node tool execution.
  • If an upgrade is not immediately possible, disable PostCSS, Babel, and TailwindCSS pipelines or enforce a confined build environment so that the Node tools cannot access files outside the project directory.
  • Only build sites sourced from trusted origins, and review the contents of any asset pipeline configuration before execution.

Generated by OpenCVE AI on May 13, 2026 at 00:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x597-9fr4-5857 Hugo's Node tool execution allows file system access outside the project directory
History

Tue, 12 May 2026 22:00:00 +0000

Type Values Removed Values Added
Description Hugo is a static site generator. From 0.43 to before 0.161.0, when building a Hugo site that uses Node-based asset pipelines (PostCSS, Babel, TailwindCSS), Hugo invoked the configured Node tools without restrictions on file system access. As a result, executing hugo against an untrusted site could allow code running through these tools to read or write files outside the project's working directory. Users who do not use PostCSS, Babel, or TailwindCSS, or who only build trusted sites, are not affected. This vulnerability is fixed in 0.161.0.
Title Hugo: Node tool execution allows file system access outside the project directory
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 6.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T21:37:52.825Z

Reserved: 2026-05-05T17:39:31.113Z

Link: CVE-2026-44301

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T22:16:36.843

Modified: 2026-05-12T22:16:36.843

Link: CVE-2026-44301

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T00:45:26Z

Weaknesses