Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/gohugoio/hugo
  4. ›
  5. CVE-2026-44301

CVE-2026-44301: Hugo's Node tool execution allows file system access outside the project directory

May 6, 2026

When building a Hugo site that uses Node-based asset pipelines (PostCSS, Babel, TailwindCSS), Hugo invoked the configured Node tools without restrictions on file system access. As a result, executing hugo against an untrusted site could allow code running through these tools to read or write files outside the project’s working directory.

Users who do not use PostCSS, Babel, or TailwindCSS, or who only build trusted sites, are not affected.

References

  • github.com/advisories/GHSA-x597-9fr4-5857
  • github.com/gohugoio/hugo
  • github.com/gohugoio/hugo/security/advisories/GHSA-x597-9fr4-5857
  • nvd.nist.gov/vuln/detail/CVE-2026-44301

Code Behaviors & Features

Detect and mitigate CVE-2026-44301 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.43.0 before 0.161.0

Fixed versions

  • 0.161.0

Solution

Upgrade to version 0.161.0 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

go/github.com/gohugoio/hugo/CVE-2026-44301.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:19:29 +0000.