Gogs is an open source self-hosted Git service. Prior to version 0.14.2, a stored cross-site scripting (XSS) vulnerability exists in the comment and issue description functionality. The application's HTML sanitizer explicitly allows data: URI schemes, enabling authenticated users to inject arbitrary JavaScript execution via malicious links. This issue has been patched in version 0.14.2.
References
| Link | Resource |
|---|---|
| https://github.com/gogs/gogs/commit/441c64d7bd8893b2f4e48660a8be3a7472e14291 | Patch |
| https://github.com/gogs/gogs/pull/8174 | Issue Tracking |
| https://github.com/gogs/gogs/releases/tag/v0.14.2 | Release Notes |
| https://github.com/gogs/gogs/security/advisories/GHSA-xrcr-gmf5-2r8j | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-05 19:16
Updated : 2026-03-06 13:55
NVD link : CVE-2026-26022
Mitre link : CVE-2026-26022
CVE.ORG link : CVE-2026-26022
JSON object : View
Products Affected
gogs
- gogs
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
