PT-2025-50327 · Gogs · Gogs

Published

2025-10-30

·

Updated

2026-01-13

·

CVE-2025-8110

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Gogs versions prior to 0.13.3
Description Gogs, a self-hosted Git service, is affected by a zero-day vulnerability (CVE-2025-8110) that allows for remote code execution (RCE). This flaw is due to improper handling of symbolic links within the
PutContents API
, enabling attackers to bypass previous security measures and overwrite critical files. Over 700 instances have been compromised, with evidence suggesting the use of the Supershell malware by attackers. The vulnerability allows authenticated users to exploit a path traversal weakness, potentially gaining unauthorized access and control over compromised systems. The
PutContents API
is the primary entry point for exploitation. The vulnerability allows attackers to overwrite files outside of the intended repository, potentially leading to system compromise. Approximately 1,400 Gogs servers were identified as publicly accessible, with over 700 confirmed as compromised.
Recommendations Disable open registration settings. Restrict server access through VPNs or allow lists. Investigate existing repositories for suspicious activity related to the
PutContents API
. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

DoS

RCE

Path traversal

Weakness Enumeration

Related Identifiers

BDU:2025-15737
CVE-2025-8110
GHSA-MQ8M-42GH-WQ7R

Affected Products

Gogs