Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, there is an arbitrary file read/write via path traversal in Git hook editing. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
References
| Link | Resource |
|---|---|
| https://github.com/gogs/gogs/security/advisories/GHSA-mrph-w4hh-gx3g | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-06 18:15
Updated : 2026-02-17 21:54
NVD link : CVE-2026-23633
Mitre link : CVE-2026-23633
CVE.ORG link : CVE-2026-23633
JSON object : View
Products Affected
gogs
- gogs
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
