CVE-2025-64111

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, due to the insufficient patch for CVE-2024-56731, it's still possible to update files in the .git directory and achieve remote command execution. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*

History

18 Feb 2026, 18:09

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
Summary
  • (es) Gogs es un servicio Git autoalojado de código abierto. En la versión 0.13.3 y anteriores, debido al parche insuficiente para CVE-2024-56731, todavía es posible actualizar archivos en el directorio .git y lograr la ejecución remota de comandos. Este problema ha sido parcheado en las versiones 0.13.4 y 0.14.0+dev.
References () https://github.com/gogs/gogs/security/advisories/GHSA-gg64-xxr9-qhjp - () https://github.com/gogs/gogs/security/advisories/GHSA-gg64-xxr9-qhjp - Exploit, Vendor Advisory
First Time Gogs
Gogs gogs

06 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 17:16

Updated : 2026-02-18 18:09


NVD link : CVE-2025-64111

Mitre link : CVE-2025-64111

CVE.ORG link : CVE-2025-64111


JSON object : View

Products Affected

gogs

  • gogs
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')