Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have a broken access control vulnerability which allows authenticated users with write access to any repository to modify labels belonging to other repositories. The UpdateLabel function in the Web UI (internal/route/repo/issue.go) fails to verify that the label being modified belongs to the repository specified in the URL path, enabling cross-repository label tampering attacks. The vulnerability exists in the Web UI's label update endpoint POST /:username/:reponame/labels/edit. The handler function UpdateLabel uses an incorrect database query function that bypasses repository ownership validation. This issue has been fixed in version 0.14.1.
References
| Link | Resource |
|---|---|
| https://github.com/gogs/gogs/commit/643a6d6353cb6a182a4e1f0720228727f30a3ad2 | Patch |
| https://github.com/gogs/gogs/security/advisories/GHSA-cv22-72px-f4gh | Exploit Vendor Advisory Mitigation |
Configurations
History
19 Feb 2026, 19:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/gogs/gogs/commit/643a6d6353cb6a182a4e1f0720228727f30a3ad2 - Patch | |
| References | () https://github.com/gogs/gogs/security/advisories/GHSA-cv22-72px-f4gh - Exploit, Vendor Advisory, Mitigation | |
| CPE | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
| First Time |
Gogs
Gogs gogs |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
19 Feb 2026, 07:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-19 07:17
Updated : 2026-02-19 19:45
NVD link : CVE-2026-25229
Mitre link : CVE-2026-25229
CVE.ORG link : CVE-2026-25229
JSON object : View
Products Affected
gogs
- gogs
CWE
CWE-284
Improper Access Control
