Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, the endpoint "PUT /repos/:owner/:repo/contents/*" does not require write permissions and allows access with read permission only via repoAssignment(). After passing the permission check, PutContents() invokes UpdateRepoFile(), which results in commit creation and the execution of git push. As a result, a token with read-only permission can be used to modify repository contents. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
References
| Link | Resource |
|---|---|
| https://github.com/gogs/gogs/security/advisories/GHSA-5qhx-gwfj-6jqr | Vendor Advisory |
Configurations
History
17 Feb 2026, 21:53
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Gogs
Gogs gogs |
|
| References | () https://github.com/gogs/gogs/security/advisories/GHSA-5qhx-gwfj-6jqr - Vendor Advisory | |
| CPE | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* |
06 Feb 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 18:15
Updated : 2026-02-17 21:53
NVD link : CVE-2026-23632
Mitre link : CVE-2026-23632
CVE.ORG link : CVE-2026-23632
JSON object : View
Products Affected
gogs
- gogs
