Description
Halo is an open source website building tool. Prior to version 2.20.13, a vulnerability in Halo allows attackers to bypass file type validation controls. This bypass enables the upload of malicious files including executables and HTML files, which can lead to stored cross-site scripting attacks and potential remote code execution under certain circumstances. This issue has been patched in version 2.20.13.
References (3)
Core 3
Core References
Exploit, Mitigation, Vendor Advisory x_refsource_confirm
https://github.com/halo-dev/halo/security/advisories/GHSA-99mc-ch53-pqh9
Issue Tracking x_refsource_misc
https://github.com/halo-dev/halo/pull/7149
Patch x_refsource_misc
https://github.com/halo-dev/halo/commit/24f8d7b57127e2607ec05adb7c912b3decddeb99
Scores
CVSS v3
9.0
EPSS
0.0102
EPSS Percentile
77.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-79
Status
published
Products (1)
halo/halo
< 2.20.13
Published
Apr 25, 2025
Tracked Since
Feb 18, 2026