Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, due to the insufficient patch for CVE-2024-56731, it's still possible to update files in the .git directory and achieve remote command execution. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
References
| Link | Resource |
|---|---|
| https://github.com/gogs/gogs/security/advisories/GHSA-gg64-xxr9-qhjp | Exploit Vendor Advisory |
Configurations
History
18 Feb 2026, 18:09
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/gogs/gogs/security/advisories/GHSA-gg64-xxr9-qhjp - Exploit, Vendor Advisory | |
| First Time |
Gogs
Gogs gogs |
06 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 17:16
Updated : 2026-02-18 18:09
NVD link : CVE-2025-64111
Mitre link : CVE-2025-64111
CVE.ORG link : CVE-2025-64111
JSON object : View
Products Affected
gogs
- gogs
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
