Back to list

Hugo's Node tool execution allows file system access outside the project directory — CVE-2026-44301

GitHub · GitHub · CVE-2026-44301

ID
CVE-2026-44301
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
medium
CVSS
6.2
EPSS
0.00062

Summary

## Impact When building a Hugo site that uses Node-based asset pipelines (PostCSS, Babel, TailwindCSS), Hugo invoked the configured Node tools without restrictions on file system access. As a result, executing hugo against an untrusted site could allow code running through these tools to read or write files outside the project's working directory. Users who do not use PostCSS, Babel, or TailwindCSS, or who only…

Product

go: github.com/gohugoio/hugo

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories