Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, due to the insufficient patch for CVE-2024-56731, it's still possible to update files in the .git directory and achieve remote command execution. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
References
| Link | Resource |
|---|---|
| https://github.com/gogs/gogs/security/advisories/GHSA-gg64-xxr9-qhjp | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-06 17:16
Updated : 2026-02-18 18:09
NVD link : CVE-2025-64111
Mitre link : CVE-2025-64111
CVE.ORG link : CVE-2025-64111
JSON object : View
Products Affected
gogs
- gogs
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
