Gogs is an open source self-hosted Git service. Prior to version 0.14.2, stored xss is still possible through unsafe template rendering that mixes user input with safe plus permissive sanitizer handling of data urls. This issue has been patched in version 0.14.2.
References
| Link | Resource |
|---|---|
| https://github.com/gogs/gogs/commit/ac21150a53bef3a3061f4da787ab193a8d68ecfc | Patch |
| https://github.com/gogs/gogs/pull/8176 | Issue Tracking |
| https://github.com/gogs/gogs/releases/tag/v0.14.2 | Release Notes |
| https://github.com/gogs/gogs/security/advisories/GHSA-vgvf-m4fw-938j | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-05 19:16
Updated : 2026-03-06 13:40
NVD link : CVE-2026-26195
Mitre link : CVE-2026-26195
CVE.ORG link : CVE-2026-26195
JSON object : View
Products Affected
gogs
- gogs
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
