Halo is an open source website building tool. Prior to version 2.20.13, a vulnerability in Halo allows attackers to bypass file type validation controls. This bypass enables the upload of malicious files including executables and HTML files, which can lead to stored cross-site scripting attacks and potential remote code execution under certain circumstances. This issue has been patched in version 2.20.13.
References
Link | Resource |
---|---|
https://github.com/halo-dev/halo/pull/7149 | Issue Tracking |
https://github.com/halo-dev/halo/security/advisories/GHSA-99mc-ch53-pqh9 | Exploit Mitigation Vendor Advisory |
Configurations
History
19 Sep 2025, 19:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:halo:halo:*:*:*:*:*:*:*:* | |
References | () https://github.com/halo-dev/halo/pull/7149 - Issue Tracking | |
References | () https://github.com/halo-dev/halo/security/advisories/GHSA-99mc-ch53-pqh9 - Exploit, Mitigation, Vendor Advisory | |
First Time |
Halo halo
Halo |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.0 |
29 Apr 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-25 16:15
Updated : 2025-09-19 19:57
NVD link : CVE-2024-56156
Mitre link : CVE-2024-56156
CVE.ORG link : CVE-2024-56156
JSON object : View
Products Affected
halo
- halo
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')