Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Unpatched Gogs Zero-Day Exploited for Months

Posted on December 11, 2025December 11, 2025 By CWS

Greater than 700 Gogs cases have been compromised by way of an unpatched zero-day vulnerability within the self-hosted Git service, cybersecurity agency Wiz warns.

Tracked as CVE-2025-8110, the exploited safety defect is described as an improper symbolic hyperlink dealing with subject within the PutContents API.

The weak point permits authenticated attackers to overwrite information exterior the repository and obtain distant code execution, explains Wiz, which recognized and reported the bug in July.

The problem, the cybersecurity outfit explains, is a symlink bypass of CVE-2024-55947, a path traversal flaw within the Gogs file replace API.

Patched in December 2024 in Gogs model 0.13.1, CVE-2024-55947 allowed attackers to jot down information to arbitrary paths on the server, equivalent to delicate system information or configuration information.

Profitable exploitation of the vulnerability would offer attackers with SSH entry to the affected servers.

The repair for the flaw added enter validation on the trail parameter, however didn’t account for symbolic hyperlinks, and risk actors have been abusing this assault vector for months.

That is potential as a result of Git and Gogs assist using symbolic hyperlinks, which can level to things exterior the repository, and the Gogs API permits the modification of information exterior the git protocol. Moreover, the Gogs API doesn’t validate the vacation spot of a symbolic hyperlink.Commercial. Scroll to proceed studying.

“As a result of Gogs respects commonplace Git conduct, it permits customers to commit symbolic hyperlinks to repositories. The vulnerability arises as a result of the API writes to the file path with out checking if the goal file is a symlink pointing exterior the repo. This successfully renders the earlier path validation ineffective if a symlink is concerned,” Wiz explains.

To take advantage of the vulnerability, risk actors create new Git repositories, commit a symbolic hyperlink pointing to a delicate goal, write knowledge to the symlink utilizing the PutContents API, and overwrite .git/config to attain arbitrary command execution.

In accordance with Wiz, there are over 1,400 uncovered Gogs cases and risk actors have compromised greater than 700 to this point.

“All contaminated cases shared the identical sample: 8-character random proprietor/repo names created inside the identical quick time window (July tenth). This implies {that a} single actor, or maybe a bunch of actors all utilizing the identical tooling, are accountable for all infections,” Wiz explains.

All Gogs servers working model 0.13.3 or older are susceptible to CVE-2025-8110 if they’re uncovered to the web and have open-registration enabled.

The Gogs maintainers are engaged on a repair for this vulnerability, however as of December 10, no patch is accessible.

Associated: IBM Patches Over 100 Vulnerabilities

Associated: Google Patches Mysterious Chrome Zero-Day Exploited within the Wild

Associated: Google Patches Gemini Enterprise Vulnerability Exposing Company Knowledge

Associated: Fortinet Patches Essential Authentication Bypass Vulnerabilities

Security Week News Tags:Exploited, Gogs, Months, Unpatched, ZeroDay

Post navigation

Previous Post: The Impact of Robotic Process Automation (RPA) on Identity and Access Management
Next Post: Wide Range of Malware Delivered in React2Shell Attacks

Related Posts

Circumvent Raises $6 Million for Cloud Security Platform Security Week News
Microsoft Patches Over 100 Vulnerabilities Security Week News
Dropzone AI Raises $37 Million for Autonomous SOC Analyst Security Week News
Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries Security Week News
Australian Man Sentenced to Prison for Wi-Fi Attacks at Airports and on Flights Security Week News
Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
  • New React RSC Vulnerabilities Enable DoS and Source Code Exposure
  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
  • CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks
  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
  • New React RSC Vulnerabilities Enable DoS and Source Code Exposure
  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
  • CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks
  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark