PT-2025-50327 · Gogs · Gogs
Published
2025-10-30
·
Updated
2026-01-13
·
CVE-2025-8110
CVSS v2.0
9.0
9.0
High
| Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Gogs versions prior to 0.13.3
Description
Gogs, a self-hosted Git service, is affected by a zero-day vulnerability (CVE-2025-8110) that allows for remote code execution (RCE). This flaw is due to improper handling of symbolic links within the
PutContents API, enabling attackers to bypass previous security measures and overwrite critical files. Over 700 instances have been compromised, with evidence suggesting the use of the Supershell malware by attackers. The vulnerability allows authenticated users to exploit a path traversal weakness, potentially gaining unauthorized access and control over compromised systems. The PutContents API is the primary entry point for exploitation. The vulnerability allows attackers to overwrite files outside of the intended repository, potentially leading to system compromise. Approximately 1,400 Gogs servers were identified as publicly accessible, with over 700 confirmed as compromised.Recommendations
Disable open registration settings.
Restrict server access through VPNs or allow lists.
Investigate existing repositories for suspicious activity related to the
PutContents API.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
DoS
RCE
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-15737
CVE-2025-8110
GHSA-MQ8M-42GH-WQ7R
Affected Products
Gogs
References · 100
- 🔥 http://wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit · Exploit
- https://github.com/gogs/gogs/commit/553707f3fd5f68f47f531cfcff56aa3ec294c6f6⭐ 47446 🔗 5072 · Patch, Security Note
- https://github.com/gogs/gogs/pull/8078⭐ 47446 🔗 5072 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-15737 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-8110 · Security Note
- https://osv.dev/vulnerability/GHSA-mq8m-42gh-wq7r · Vendor Advisory
- https://github.com/gogs/gogs⭐ 47446 🔗 5072 · Note
- https://github.com/gogs/gogs/pull/8082⭐ 47446 🔗 5072 · Note
- https://github.com/advisories/GHSA-mq8m-42gh-wq7r · Note
- https://twitter.com/threatcluster/status/1998905625883939289 · Twitter Post
- https://twitter.com/piedpiper1616/status/1999313582111248411 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1pk2neo/unpatched_gogs_vulnerability_exploited_in_700 · Reddit Post
- https://twitter.com/TweetThreatNews/status/2010887071246725217 · Twitter Post
- https://twitter.com/dailytechonx/status/1999538498139717667 · Twitter Post
- https://t.me/aptreports/24532 · Telegram Post