Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code.
References
| Link | Resource |
|---|---|
| http://wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit | Exploit Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2025/12/11/3 | Mailing List |
| http://www.openwall.com/lists/oss-security/2025/12/11/4 | Mailing List |
| http://www.openwall.com/lists/oss-security/2026/01/17/4 | Mailing List |
| http://www.openwall.com/lists/oss-security/2026/01/18/1 | Mailing List |
| http://www.openwall.com/lists/oss-security/2026/01/18/2 | Mailing List |
| https://github.com/gogs/gogs/commit/553707f3fd5f68f47f531cfcff56aa3ec294c6f6 | Patch |
| https://github.com/gogs/gogs/pull/8078 | Exploit Issue Tracking Patch Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-8110 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2025-12-10 14:16
Updated : 2026-01-20 13:47
NVD link : CVE-2025-8110
Mitre link : CVE-2025-8110
CVE.ORG link : CVE-2025-8110
JSON object : View
Products Affected
gogs
- gogs
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
