Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Unpatched Gogs Zero-Day Exploited for Months

Unpatched Gogs Zero-Day Exploited for Months

Posted on December 11, 2025December 11, 2025 By CWS

Greater than 700 Gogs cases have been compromised by way of an unpatched zero-day vulnerability within the self-hosted Git service, cybersecurity agency Wiz warns.

Tracked as CVE-2025-8110, the exploited safety defect is described as an improper symbolic hyperlink dealing with subject within the PutContents API.

The weak point permits authenticated attackers to overwrite information exterior the repository and obtain distant code execution, explains Wiz, which recognized and reported the bug in July.

The problem, the cybersecurity outfit explains, is a symlink bypass of CVE-2024-55947, a path traversal flaw within the Gogs file replace API.

Patched in December 2024 in Gogs model 0.13.1, CVE-2024-55947 allowed attackers to jot down information to arbitrary paths on the server, equivalent to delicate system information or configuration information.

Profitable exploitation of the vulnerability would offer attackers with SSH entry to the affected servers.

The repair for the flaw added enter validation on the trail parameter, however didn’t account for symbolic hyperlinks, and risk actors have been abusing this assault vector for months.

That is potential as a result of Git and Gogs assist using symbolic hyperlinks, which can level to things exterior the repository, and the Gogs API permits the modification of information exterior the git protocol. Moreover, the Gogs API doesn’t validate the vacation spot of a symbolic hyperlink.Commercial. Scroll to proceed studying.

“As a result of Gogs respects commonplace Git conduct, it permits customers to commit symbolic hyperlinks to repositories. The vulnerability arises as a result of the API writes to the file path with out checking if the goal file is a symlink pointing exterior the repo. This successfully renders the earlier path validation ineffective if a symlink is concerned,” Wiz explains.

To take advantage of the vulnerability, risk actors create new Git repositories, commit a symbolic hyperlink pointing to a delicate goal, write knowledge to the symlink utilizing the PutContents API, and overwrite .git/config to attain arbitrary command execution.

In accordance with Wiz, there are over 1,400 uncovered Gogs cases and risk actors have compromised greater than 700 to this point.

“All contaminated cases shared the identical sample: 8-character random proprietor/repo names created inside the identical quick time window (July tenth). This implies {that a} single actor, or maybe a bunch of actors all utilizing the identical tooling, are accountable for all infections,” Wiz explains.

All Gogs servers working model 0.13.3 or older are susceptible to CVE-2025-8110 if they’re uncovered to the web and have open-registration enabled.

The Gogs maintainers are engaged on a repair for this vulnerability, however as of December 10, no patch is accessible.

Associated: IBM Patches Over 100 Vulnerabilities

Associated: Google Patches Mysterious Chrome Zero-Day Exploited within the Wild

Associated: Google Patches Gemini Enterprise Vulnerability Exposing Company Knowledge

Associated: Fortinet Patches Essential Authentication Bypass Vulnerabilities

Security Week News Tags:Exploited, Gogs, Months, Unpatched, ZeroDay

Post navigation

Previous Post: The Impact of Robotic Process Automation (RPA) on Identity and Access Management
Next Post: Wide Range of Malware Delivered in React2Shell Attacks

Related Posts

Adobe Patches Nearly 140 Vulnerabilities Adobe Patches Nearly 140 Vulnerabilities Security Week News
Saporo Raises  Million for Identity Security Platform Saporo Raises $8 Million for Identity Security Platform Security Week News
MainStreet Bank Data Breach Impacts Customer Payment Cards  MainStreet Bank Data Breach Impacts Customer Payment Cards  Security Week News
18 Arrested in Crackdown on Credit Card Fraud Rings 18 Arrested in Crackdown on Credit Card Fraud Rings Security Week News
Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities Security Week News
Tidal Cyber Raises  Million for CTI and Adversary Behavior Platform Tidal Cyber Raises $10 Million for CTI and Adversary Behavior Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News