Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
NVD published the first details for CVE-2024-32875
A CVSS base score of 6.1 has been assigned.
Feedly found the first article mentioning CVE-2024-32875. See article
EPSS Score was set to: 0.05% (Percentile: 14.1%)
The vulnerability CVE-2024-32875 in Hugo static site generator allows for unescaped title arguments in Markdown, potentially leading to code injection. This critical vulnerability was patched in version 0.125.3, and users are advised to update immediately to mitigate the risk of exploitation by malicious actors. Downstream impacts may affect third-party vendors who rely on Hugo for their static site generation. See article
EPSS Score was set to: 0.05% (Percentile: 14.4%)