We found results for “


Date: January 13, 2022


In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the article tag. An authenticated admin attacker can inject arbitrary javascript code that will execute on a victim’s server.


Halo is a modern open-source blogging and content management system. Affected versions of Halo are vulnerable to stored XSS when creating an article with javascript payloads in its tag. These scripts are executed in a victim’s browser.

PoC Details

Login to the application as admin.
Create a new tag label with a malicious payload given below.
Create a new article, then press release.
Add the recently created label, and press “save”. Go to “All Articles” and press the newly created article. The payload will be triggered.

PoC Code

<script>alert("XSS in TAG")</script>

Affected Environments

Halo versions v1.0.0 through v1.4.17 (latest)


No fix is provided

Language: Java

Good to know:


Cross-Site Scripting (XSS)


Upgrade Version

No fix version available

Base Score:
Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): Required
Scope (S): Changed
Confidentiality (C): Low
Integrity (I): Low
Availability (A): None
Base Score:
Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (AU): Single
Confidentiality (C): None
Integrity (I): Partial
Availability (A): None
Additional information: