Gogs is an open source self-hosted Git service. Prior to version 0.14.2, gogs api still accepts tokens in url params like token and access_token, which can leak through logs, browser history, and referrers. This issue has been patched in version 0.14.2.
References
| Link | Resource |
|---|---|
| https://github.com/gogs/gogs/commit/295bfba72993c372e7b338438947d8e1a6bed8fd | Patch |
| https://github.com/gogs/gogs/pull/8177 | Issue Tracking |
| https://github.com/gogs/gogs/releases/tag/v0.14.2 | Release Notes |
| https://github.com/gogs/gogs/security/advisories/GHSA-x9p5-w45c-7ffc | Vendor Advisory Mitigation |
Configurations
History
No history.
Information
Published : 2026-03-05 19:16
Updated : 2026-03-05 22:04
NVD link : CVE-2026-26196
Mitre link : CVE-2026-26196
CVE.ORG link : CVE-2026-26196
JSON object : View
Products Affected
gogs
- gogs
CWE
CWE-598
Use of GET Request Method With Sensitive Query Strings
