CVEDNA

Version AMP - Chargement ultra-rapide

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

U.S. Cybersecurity Agency Alerts on Critical Security Flaw in Gogs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding an active exploitation of a high-severity security flaw impacting the open-source project Gogs. This vulnerability, tracked as CVE-2025-8110 (CVSS score: 8.7), relates to a case of path traversal in the repository file editor that could result in code execution.

What is Gogs?

Gogs (Go Gs insti) is an open-source Git service, written using the Go programming language. It's designed to be self-hosted and easy to use, making it a popular choice for developers looking for a lightweight solution.

The Vulnerability Details

The vulnerability, CVE-2025-8110, affects how Gogs handles file paths in its repository editor. An attacker who can exploit this flaw could potentially execute arbitrary code on the server where Gogs is hosted, leading to a significant security risk.

What Does This Mean for Users?

Users of Gogs are advised to take immediate action to protect their instances from exploitation. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, indicating that it is actively being exploited in the wild.

What Should You Do?

Conclusion

The active exploitation of CVE-2025-8110 highlights the importance of keeping software up-to-date and implementing robust security practices. By taking immediate action, users can protect their Gogs instances from potential code execution attacks.