gogs CVE Vulnerabilities & Metrics

Focus on gogs vulnerabilities and metrics.

Last updated: 08 Mar 2026, 23:25 UTC

About gogs Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with gogs. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total gogs CVEs: 49
Earliest CVE date: 08 Aug 2018, 00:29 UTC
Latest CVE date: 05 Mar 2026, 19:16 UTC

Latest CVE reference: CVE-2026-26276

Rolling Stats

30-day Count (Rolling): 10
365-day Count (Rolling): 18

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 66.67%
Year Variation (Calendar): 125.0%

Month Growth Rate (30-day Rolling): 66.67%
Year Growth Rate (365-day Rolling): 125.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical gogs CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.37

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 30
4.0-6.9 16
7.0-8.9 3
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS gogs CVEs

These are the five CVEs with the highest CVSS scores for gogs, sorted by severity first and recency.

All CVEs for gogs

CVE-2026-26276 gogs vulnerability CVSS: 0 05 Mar 2026, 19:16 UTC

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, an attacker can store an HTML/JavaScript payload in a repository’s Milestone name, and when another user selects that Milestone on the New Issue page (/issues/new), a DOM-Based XSS is triggered. This issue has been patched in version 0.14.2.

CVE-2026-26196 gogs vulnerability CVSS: 0 05 Mar 2026, 19:16 UTC

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, gogs api still accepts tokens in url params like token and access_token, which can leak through logs, browser history, and referrers. This issue has been patched in version 0.14.2.

CVE-2026-26195 gogs vulnerability CVSS: 0 05 Mar 2026, 19:16 UTC

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, stored xss is still possible through unsafe template rendering that mixes user input with safe plus permissive sanitizer handling of data urls. This issue has been patched in version 0.14.2.

CVE-2026-26194 gogs vulnerability CVSS: 0 05 Mar 2026, 19:16 UTC

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, there's a security issue in gogs where deleting a release can fail if a user controlled tag name is passed to git without the right separator, this lets git options get injected and mess with the process. This issue has been patched in version 0.14.2.

CVE-2026-26022 gogs vulnerability CVSS: 0 05 Mar 2026, 19:16 UTC

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, a stored cross-site scripting (XSS) vulnerability exists in the comment and issue description functionality. The application's HTML sanitizer explicitly allows data: URI schemes, enabling authenticated users to inject arbitrary JavaScript execution via malicious links. This issue has been patched in version 0.14.2.

CVE-2026-25921 gogs vulnerability CVSS: 0 05 Mar 2026, 19:16 UTC

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue has been patched in version 0.14.2.

CVE-2026-25242 gogs vulnerability CVSS: 0 19 Feb 2026, 07:17 UTC

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below expose unauthenticated file upload endpoints by default. When the global RequireSigninView setting is disabled (default), any remote user can upload arbitrary files to the server via /releases/attachments and /issues/attachments. This enables the instance to be abused as a public file host, potentially leading to disk exhaustion, content hosting, or delivery of malware. CSRF tokens do not mitigate this attack due to same-origin cookie issuance. This issue has been fixed in version 0.14.1.

CVE-2026-25232 gogs vulnerability CVSS: 0 19 Feb 2026, 07:17 UTC

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have an access control bypass vulnerability which allows any repository collaborator with Write permissions to delete protected branches (including the default branch) by sending a direct POST request, completely bypassing the branch protection mechanism. This vulnerability in the DeleteBranchPost function eenables privilege escalation from Write to Admin level, allowing low-privilege users to perform dangerous operations that should be restricted to administrators only. Although Git Hook layer correctly prevents protected branch deletion via SSH push, the web interface deletion operation does not trigger Git Hooks, resulting in complete bypass of protection mechanisms. In oder to exploit this vulnerability, attackers must have write permissions to the target repository, protected branches configured to the target repository and access to the Gogs web interface. This issue has been fixed in version 0.14.1.

CVE-2026-25229 gogs vulnerability CVSS: 0 19 Feb 2026, 07:17 UTC

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have a broken access control vulnerability which allows authenticated users with write access to any repository to modify labels belonging to other repositories. The UpdateLabel function in the Web UI (internal/route/repo/issue.go) fails to verify that the label being modified belongs to the repository specified in the URL path, enabling cross-repository label tampering attacks. The vulnerability exists in the Web UI's label update endpoint POST /:username/:reponame/labels/edit. The handler function UpdateLabel uses an incorrect database query function that bypasses repository ownership validation. This issue has been fixed in version 0.14.1.

CVE-2026-25120 gogs vulnerability CVSS: 0 19 Feb 2026, 07:17 UTC

Gogs is an open source self-hosted Git service. In versions 0.13.4 and below, the DeleteComment API does not verify that the comment belongs to the repository specified in the URL. This allows a repository administrator to delete comments from any other repository by supplying arbitrary comment IDs, bypassing authorization controls. The DeleteComment function retrieves a comment by ID without verifying repository ownership and the Database function DeleteCommentByID performs no repository validation. This issue has been fixed in version 0.14.0.

CVE-2026-24135 gogs vulnerability CVSS: 0 06 Feb 2026, 18:15 UTC

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, a path traversal vulnerability exists in the updateWikiPage function of Gogs. The vulnerability allows an authenticated user with write access to a repository's wiki to delete arbitrary files on the server by manipulating the old_title parameter in the wiki editing form. This issue has been patched in versions 0.13.4 and 0.14.0+dev.

CVE-2026-23633 gogs vulnerability CVSS: 0 06 Feb 2026, 18:15 UTC

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, there is an arbitrary file read/write via path traversal in Git hook editing. This issue has been patched in versions 0.13.4 and 0.14.0+dev.

CVE-2026-23632 gogs vulnerability CVSS: 0 06 Feb 2026, 18:15 UTC

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, the endpoint "PUT /repos/:owner/:repo/contents/*" does not require write permissions and allows access with read permission only via repoAssignment(). After passing the permission check, PutContents() invokes UpdateRepoFile(), which results in commit creation and the execution of git push. As a result, a token with read-only permission can be used to modify repository contents. This issue has been patched in versions 0.13.4 and 0.14.0+dev.

CVE-2026-22592 gogs vulnerability CVSS: 0 06 Feb 2026, 18:15 UTC

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, an authenticated user can cause a DOS attack. If one of the repo files is deleted before synchronization, it will cause the application to crash. This issue has been patched in versions 0.13.4 and 0.14.0+dev.

CVE-2025-64175 gogs vulnerability CVSS: 0 06 Feb 2026, 18:15 UTC

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, Gogs’ 2FA recovery code validation does not scope codes by user, enabling cross-account bypass. If an attacker knows a victim’s username and password, they can use any unused recovery code (e.g., from their own account) to bypass the victim’s 2FA. This enables full account takeover and renders 2FA ineffective in all environments where it's enabled.. This issue has been patched in versions 0.13.4 and 0.14.0+dev.

CVE-2025-64111 gogs vulnerability CVSS: 0 06 Feb 2026, 17:16 UTC

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, due to the insufficient patch for CVE-2024-56731, it's still possible to update files in the .git directory and achieve remote command execution. This issue has been patched in versions 0.13.4 and 0.14.0+dev.

CVE-2025-8110 gogs vulnerability CVSS: 0 10 Dec 2025, 14:16 UTC

Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code.

CVE-2024-56731 gogs vulnerability CVSS: 0 24 Jun 2025, 04:15 UTC

Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.

CVE-2024-55947 gogs vulnerability CVSS: 0 23 Dec 2024, 16:15 UTC

Gogs is an open source self-hosted Git service. A malicious user is able to write a file to an arbitrary path on the server to gain SSH access to the server. The vulnerability is fixed in 0.13.1.

CVE-2024-54148 gogs vulnerability CVSS: 0 23 Dec 2024, 16:15 UTC

Gogs is an open source self-hosted Git service. A malicious user is able to commit and edit a crafted symlink file to a repository to gain SSH access to the server. The vulnerability is fixed in 0.13.1.

CVE-2024-44625 gogs vulnerability CVSS: 0 15 Nov 2024, 17:15 UTC

Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.

CVE-2022-1884 gogs vulnerability CVSS: 0 15 Nov 2024, 11:15 UTC

A remote command execution vulnerability exists in gogs/gogs versions <=0.12.7 when deployed on a Windows server. The vulnerability arises due to improper validation of the `tree_path` parameter during file uploads. An attacker can set `tree_path=.git.` to upload a file into the .git directory, allowing them to write or rewrite the `.git/config` file. If the `core.sshCommand` is set, this can lead to remote command execution.

CVE-2024-39933 gogs vulnerability CVSS: 0 04 Jul 2024, 16:15 UTC

Gogs through 0.13.0 allows argument injection during the tagging of a new release.

CVE-2024-39932 gogs vulnerability CVSS: 0 04 Jul 2024, 16:15 UTC

Gogs through 0.13.0 allows argument injection during the previewing of changes.

CVE-2024-39931 gogs vulnerability CVSS: 0 04 Jul 2024, 16:15 UTC

Gogs through 0.13.0 allows deletion of internal files.

CVE-2024-39930 gogs vulnerability CVSS: 0 04 Jul 2024, 16:15 UTC

The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.

CVE-2022-2024 gogs vulnerability CVSS: 0 25 Feb 2023, 08:15 UTC

OS Command Injection in GitHub repository gogs/gogs prior to 0.12.11.

CVE-2022-32174 gogs vulnerability CVSS: 0 11 Oct 2022, 15:15 UTC

In Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover.

CVE-2022-31038 gogs vulnerability CVSS: 3.5 09 Jun 2022, 17:15 UTC

Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious characters.

CVE-2022-1993 gogs vulnerability CVSS: 5.5 09 Jun 2022, 17:15 UTC

Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.

CVE-2022-1992 gogs vulnerability CVSS: 6.4 09 Jun 2022, 17:15 UTC

Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.

CVE-2022-1986 gogs vulnerability CVSS: 7.5 09 Jun 2022, 17:15 UTC

OS Command Injection in GitHub repository gogs/gogs prior to 0.12.9.

CVE-2021-32546 gogs vulnerability CVSS: 6.5 02 Jun 2022, 14:15 UTC

Missing input validation in internal/db/repo_editor.go in Gogs before 0.12.8 allows an attacker to execute code remotely. An unprivileged attacker (registered user) can overwrite the Git configuration in his repository. This leads to Remote Command Execution, because that configuration can contain an option such as sshCommand, which is executed when a master branch is a remote branch (using an ssh:// URI). The remote branch can also be configured by editing the Git configuration file. One can create a new file in a new repository, using the GUI, with "\" as its name, and then rename this file to .git/config with the custom configuration content (and then save it).

CVE-2022-1285 gogs vulnerability CVSS: 4.3 01 Jun 2022, 06:15 UTC

Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.8.

CVE-2022-1464 gogs vulnerability CVSS: 3.5 05 May 2022, 14:15 UTC

Stored xss bug in GitHub repository gogs/gogs prior to 0.12.7. As the repo is public , any user can view the report and when open the attachment then xss is executed. This bug allow executed any javascript code in victim account .

CVE-2022-0415 gogs vulnerability CVSS: 6.5 21 Mar 2022, 11:15 UTC

Remote Command Execution in uploading repository file in GitHub repository gogs/gogs prior to 0.12.6.

CVE-2022-0871 gogs vulnerability CVSS: 5.8 11 Mar 2022, 12:15 UTC

Missing Authorization in GitHub repository gogs/gogs prior to 0.12.5.

CVE-2022-0870 gogs vulnerability CVSS: 5.0 11 Mar 2022, 11:15 UTC

Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.5.

CVE-2020-15867 gogs vulnerability CVSS: 6.5 16 Oct 2020, 14:15 UTC

The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution. There can be a privilege escalation if access to this hook feature is granted to a user who does not have administrative privileges. NOTE: because this is mentioned in the documentation but not in the UI, it could be considered a "Product UI does not Warn User of Unsafe Actions" issue.

CVE-2020-14958 gogs vulnerability CVSS: 4.0 21 Jun 2020, 20:15 UTC

In Gogs 0.11.91, MakeEmailPrimary in models/user_mail.go lacks a "not the owner of the email" check.

CVE-2020-9329 gogs vulnerability CVSS: 4.3 21 Feb 2020, 22:15 UTC

Gogs through 0.11.91 allows attackers to violate the admin-specified repo-creation policy due to an internal/db/repo.go race condition.

CVE-2019-14544 gogs vulnerability CVSS: 7.5 02 Aug 2019, 22:15 UTC

routes/api/v1/api.go in Gogs 0.11.86 lacks permission checks for routes: deploy keys, collaborators, and hooks.

CVE-2018-20303 gogs vulnerability CVSS: 5.0 20 Dec 2018, 00:29 UTC

In pkg/tool/path.go in Gogs before 0.11.82.1218, a directory traversal in the file-upload functionality can allow an attacker to create a file under data/sessions on the server, a similar issue to CVE-2018-18925.

CVE-2018-18925 gogs vulnerability CVSS: 7.5 04 Nov 2018, 05:29 UTC

Gogs 0.11.66 allows remote code execution because it does not properly validate session IDs, as demonstrated by a ".." session-file forgery in the file session provider in file.go. This is related to session ID handling in the go-macaron/session code for Macaron.

CVE-2018-17031 gogs vulnerability CVSS: 4.3 14 Sep 2018, 02:29 UTC

In Gogs 0.11.53, an attacker can use a crafted .eml file to trigger MIME type sniffing, which leads to XSS, as demonstrated by Internet Explorer, because an "X-Content-Type-Options: nosniff" header is not sent.

CVE-2018-16409 gogs vulnerability CVSS: 5.0 03 Sep 2018, 19:29 UTC

In Gogs 0.11.53, an attacker can use migrate to send arbitrary HTTP GET requests, leading to SSRF.

CVE-2018-15193 gogs vulnerability CVSS: 6.8 08 Aug 2018, 02:29 UTC

A CSRF vulnerability in the admin panel in Gogs through 0.11.53 allows remote attackers to execute admin operations via a crafted issue / link.

CVE-2018-15192 gogs vulnerability CVSS: 5.0 08 Aug 2018, 02:29 UTC

An SSRF vulnerability in webhooks in Gitea through 1.5.0-rc2 and Gogs through 0.11.53 allows remote attackers to access intranet services.

CVE-2018-15178 gogs vulnerability CVSS: 5.8 08 Aug 2018, 00:29 UTC

Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.