top of page

CISA Adds Gogs Flaw to Known Exploited Vulnerabilities Catalog

  • Jan 13
  • 2 min read

Key Findings:


  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a flaw impacting Gogs, a lightweight, open-source, self-hosted Git service, to its Known Exploited Vulnerabilities (KEV) catalog.

  • The vulnerability, tracked as CVE-2025-8110, has a CVSS score of 8.7 and is a path traversal issue in the PutContents API that allows for local execution of code.

  • The flaw is a bypass for a previously patched remote code execution (RCE) vulnerability, CVE-2024-55947, and allows attackers to overwrite files outside the repository and achieve RCE.

  • Wiz Research discovered the vulnerability while investigating a malware incident and found over 700 compromised Gogs instances on the internet.

  • CISA has ordered Federal Civilian Executive Branch (FCEB) agencies to address the identified vulnerability by February 2, 2026, to protect their networks against attacks.


Background


Gogs (Go Git Service) is a lightweight, open-source, self-hosted Git service written in Go. The vulnerability CVE-2025-8110 is a path traversal issue in the PutContents API that allows for local execution of code. It is a bypass for an earlier RCE vulnerability, CVE-2024-55947, which was previously discovered and patched.


Vulnerability Details


  • The vulnerability is an improper symbolic link handling in the PutContents API in Gogs that allows local execution of code.

  • An attacker can create a symlink in a repository that points to a file outside the repo, then use the API to write through the symlink, causing the system to follow the link and overwrite the target file, like .git/config, enabling them to execute commands.

  • This shows a repeated problem with symlink handling in Gogs, as the developers had previously patched a similar issue but did not properly address the symlink handling.


Exploitation and Impact


  • Wiz Research discovered the vulnerability while investigating a malware incident and found over 700 compromised Gogs instances on the internet.

  • The researchers observed suspicious repositories with random 8-character names, created shortly before the infection, indicating an automated attack.

  • Expanding the search found approximately 1,400 exposed Gogs instances, with over 700 compromised, all showing the same patterns, suggesting a single actor or group using the same automated tools.


CISA Response


  • CISA has added the vulnerability CVE-2025-8110 to its Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation.

  • According to Binding Operational Directive (BOD) 22-01, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks.

  • CISA has ordered federal agencies to fix the vulnerabilities by February 2, 2026.

  • Experts recommend that private organizations also review the Catalog and address the vulnerabilities in their infrastructure.


Sources


  • https://securityaffairs.com/186837/hacking/u-s-cisa-adds-a-flaw-in-gogs-to-its-known-exploited-vulnerabilities-catalog.html

  • https://thehackernews.com/2026/01/cisa-warns-of-active-exploitation-of.html

  • https://x.com/shah_sheikh/status/2010835175513432152

  • https://x.com/securityaffairs/status/2010833273312739779

  • https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page