| Name | CVE-2026-44301 |
| Description | Hugo is a static site generator. From 0.43 to before 0.161.0, when building a Hugo site that uses Node-based asset pipelines (PostCSS, Babel, TailwindCSS), Hugo invoked the configured Node tools without restrictions on file system access. As a result, executing hugo against an untrusted site could allow code running through these tools to read or write files outside the project's working directory. Users who do not use PostCSS, Babel, or TailwindCSS, or who only build trusted sites, are not affected. This vulnerability is fixed in 0.161.0. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| hugo (PTS) | bullseye | 0.80.0-6 | vulnerable |
| bullseye (security) | 0.80.0-6+deb11u1 | vulnerable | |
| bookworm | 0.111.3-1 | vulnerable | |
| trixie | 0.131.0-1 | vulnerable | |
| forky | 0.161.0-1 | fixed | |
| sid | 0.161.1-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| hugo | source | (unstable) | 0.161.0-1 |
https://github.com/gohugoio/hugo/security/advisories/GHSA-x597-9fr4-5857