Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Unpatched Gogs Zero-Day Exploited for Months

Posted on December 11, 2025December 11, 2025 By CWS

Greater than 700 Gogs cases have been compromised by way of an unpatched zero-day vulnerability within the self-hosted Git service, cybersecurity agency Wiz warns.

Tracked as CVE-2025-8110, the exploited safety defect is described as an improper symbolic hyperlink dealing with subject within the PutContents API.

The weak point permits authenticated attackers to overwrite information exterior the repository and obtain distant code execution, explains Wiz, which recognized and reported the bug in July.

The problem, the cybersecurity outfit explains, is a symlink bypass of CVE-2024-55947, a path traversal flaw within the Gogs file replace API.

Patched in December 2024 in Gogs model 0.13.1, CVE-2024-55947 allowed attackers to jot down information to arbitrary paths on the server, equivalent to delicate system information or configuration information.

Profitable exploitation of the vulnerability would offer attackers with SSH entry to the affected servers.

The repair for the flaw added enter validation on the trail parameter, however didn’t account for symbolic hyperlinks, and risk actors have been abusing this assault vector for months.

That is potential as a result of Git and Gogs assist using symbolic hyperlinks, which can level to things exterior the repository, and the Gogs API permits the modification of information exterior the git protocol. Moreover, the Gogs API doesn’t validate the vacation spot of a symbolic hyperlink.Commercial. Scroll to proceed studying.

“As a result of Gogs respects commonplace Git conduct, it permits customers to commit symbolic hyperlinks to repositories. The vulnerability arises as a result of the API writes to the file path with out checking if the goal file is a symlink pointing exterior the repo. This successfully renders the earlier path validation ineffective if a symlink is concerned,” Wiz explains.

To take advantage of the vulnerability, risk actors create new Git repositories, commit a symbolic hyperlink pointing to a delicate goal, write knowledge to the symlink utilizing the PutContents API, and overwrite .git/config to attain arbitrary command execution.

In accordance with Wiz, there are over 1,400 uncovered Gogs cases and risk actors have compromised greater than 700 to this point.

“All contaminated cases shared the identical sample: 8-character random proprietor/repo names created inside the identical quick time window (July tenth). This implies {that a} single actor, or maybe a bunch of actors all utilizing the identical tooling, are accountable for all infections,” Wiz explains.

All Gogs servers working model 0.13.3 or older are susceptible to CVE-2025-8110 if they’re uncovered to the web and have open-registration enabled.

The Gogs maintainers are engaged on a repair for this vulnerability, however as of December 10, no patch is accessible.

Associated: IBM Patches Over 100 Vulnerabilities

Associated: Google Patches Mysterious Chrome Zero-Day Exploited within the Wild

Associated: Google Patches Gemini Enterprise Vulnerability Exposing Company Knowledge

Associated: Fortinet Patches Essential Authentication Bypass Vulnerabilities

Security Week News Tags:Exploited, Gogs, Months, Unpatched, ZeroDay

Post navigation

Previous Post: The Impact of Robotic Process Automation (RPA) on Identity and Access Management
Next Post: Wide Range of Malware Delivered in React2Shell Attacks

Related Posts

Cisco Patches 35 Vulnerabilities Across Several Products Security Week News
Australian Human Rights Commission Discloses Data Breach Security Week News
Beyond the Black Box: Building Trust and Governance in the Age of AI Security Week News
Tenzai Raises $75 Million in Seed Funding to Build AI-Powered Pentesting Platform Security Week News
SonicWall SSL VPN Accounts in Attacker Crosshairs Security Week News
Promptfoo Raises $18.4 Million for AI Security Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog
  • Trump Signs Executive Order to Block State AI Regulations
  • New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks
  • Developers Frustrated by ‘No Server Available’ Message

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog
  • Trump Signs Executive Order to Block State AI Regulations
  • New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks
  • Developers Frustrated by ‘No Server Available’ Message

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark