Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, there is an arbitrary file read/write via path traversal in Git hook editing. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
References
| Link | Resource |
|---|---|
| https://github.com/gogs/gogs/security/advisories/GHSA-mrph-w4hh-gx3g | Exploit Vendor Advisory |
Configurations
History
17 Feb 2026, 21:54
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
| First Time |
Gogs
Gogs gogs |
|
| References | () https://github.com/gogs/gogs/security/advisories/GHSA-mrph-w4hh-gx3g - Exploit, Vendor Advisory |
06 Feb 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 18:15
Updated : 2026-02-17 21:54
NVD link : CVE-2026-23633
Mitre link : CVE-2026-23633
CVE.ORG link : CVE-2026-23633
JSON object : View
Products Affected
gogs
- gogs
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
