CVE-2026-23633

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, there is an arbitrary file read/write via path traversal in Git hook editing. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*

History

17 Feb 2026, 21:54

Type Values Removed Values Added
CPE cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
First Time Gogs
Gogs gogs
References () https://github.com/gogs/gogs/security/advisories/GHSA-mrph-w4hh-gx3g - () https://github.com/gogs/gogs/security/advisories/GHSA-mrph-w4hh-gx3g - Exploit, Vendor Advisory

06 Feb 2026, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 18:15

Updated : 2026-02-17 21:54


NVD link : CVE-2026-23633

Mitre link : CVE-2026-23633

CVE.ORG link : CVE-2026-23633


JSON object : View

Products Affected

gogs

  • gogs
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')