CVE-2024-32875

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)

Published: Apr 23, 2024 / Updated: 7mo ago

010
CVSS 6.1EPSS 0.05%Medium
CVE info copied to clipboard

Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates.

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Timeline

Vendor Advisory

GitHub Advisories released a security advisory.

Apr 23, 2024 at 1:54 PM
CVE Assignment

NVD published the first details for CVE-2024-32875

Apr 23, 2024 at 9:15 PM
CVSS

A CVSS base score of 6.1 has been assigned.

Apr 23, 2024 at 9:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-32875. See article

Apr 23, 2024 at 9:21 PM / GitHub Advisory Database
EPSS

EPSS Score was set to: 0.05% (Percentile: 14.1%)

Apr 24, 2024 at 10:03 AM
Threat Intelligence Report

The vulnerability CVE-2024-32875 in Hugo static site generator allows for unescaped title arguments in Markdown, potentially leading to code injection. This critical vulnerability was patched in version 0.125.3, and users are advised to update immediately to mitigate the risk of exploitation by malicious actors. Downstream impacts may affect third-party vendors who rely on Hugo for their static site generation. See article

Apr 29, 2024 at 10:00 PM
EPSS

EPSS Score was set to: 0.05% (Percentile: 14.4%)

May 6, 2024 at 9:45 PM
Static CVE Timeline Graph

Affected Systems

Gohugo/hugo
+null more

Patches

Github Advisory
+null more

Attack Patterns

CAPEC-209: XSS Using MIME Type Mismatch
+null more

Vendor Advisory

[GHSA-ppf8-hhpp-f5hj] Hugo Markdown titles do not escaped in internal render hooks
Impacted are Hugo users who have these hooks enabled and do not trust their Markdown content files. Impacted are Hugo users who have these hooks enabled and do not trust their Markdown content files.

News

CVE-2024-32875 vulnerabilities
Vulnerabilities for packages:...
CVE-2024-32875
Medium Severity Description Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates. Read more at https://www.tenable.com/cve/CVE-2024-32875
CVE-2024-32875 | gohugoio hugo up to 0.125.2 Markdown title cross site scripting (GHSA-ppf8-hhpp-f5hj)
A vulnerability was found in gohugoio hugo up to 0.125.2 . It has been declared as problematic . This vulnerability affects unknown code of the component Markdown Handler . The manipulation of the argument title leads to basic cross site scripting. This vulnerability was named CVE-2024-32875 . The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
NA - CVE-2024-32875 - Hugo is a static site generator. Starting in...
Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are...
advng accepted merge request !27963: Add CVE-2024-32875 to go/github.com/gohugoio/hugo at GitLab.org / security-products / advisory-database
See 4 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI