Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Gogs Flaw Allows Silent Overwriting of LFS Objects

Critical Gogs Flaw Allows Silent Overwriting of LFS Objects

Posted on March 11, 2026 By CWS

A critical vulnerability has been identified in Gogs, a widely used open-source Git service, which permits attackers to undetectably overwrite Large File Storage (LFS) objects.

Understanding the Gogs Vulnerability

Labeled as CVE-2026-25921, this high-severity flaw has been assigned a perfect CVSS 3.1 score of 10.0, indicating its potential to facilitate severe software supply-chain attacks. Currently, it impacts Gogs versions 0.14.1 and earlier, with no official fix released yet.

If this vulnerability is exploited, attackers can alter essential binaries, datasets, or software builds within any repository on a shared server, all without generating any alerts.

The Root Cause Explained

The critical issue arises from two main design weaknesses in Gogs’ LFS architecture:

  • Lack of Storage Isolation: All LFS objects are stored in a single, shared location, without repository-specific isolation.
  • Missing Hash Verification: Gogs fails to verify if the uploaded file’s content matches its stated SHA-256 hash.

These weaknesses mean that an attacker only requires knowledge of a target file’s hash to upload a manipulated file, such as a compromised software installer, into their repository. The server, mistaking it for a routine retry, overwrites the legitimate file with the attacker’s version.

Implications and Interim Measures

The implications of CVE-2026-25921 are severe, as the attack complexity is low, requires no special privileges, and can occur without user involvement. Legitimate users downloading the affected LFS objects may unknowingly receive tampered files, leading to potential supply-chain compromises.

In the absence of an official patch, organizations using self-hosted Gogs instances need to enforce strict security measures. This includes limiting account creation and LFS upload permissions to trusted users and implementing external scripts to periodically verify the integrity of critical LFS files.

The eventual solution from developers will necessitate strict verification of the SHA-256 hash of all uploaded LFS objects to ensure data authenticity before server storage.

Stay informed with daily cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to feature your cybersecurity stories.

Cyber Security News Tags:CVE-2026-25921, CWE-345, Cybersecurity, Git, Gogs, hash verification, LFS, Open Source, Security, self-hosted, Software, storage isolation, supply chain attack, Vulnerability

Post navigation

Previous Post: Malicious Rust Crates and AI Bot Threaten Developer Secrets
Next Post: Siemens and Schneider Lead ICS Patch Tuesday Updates

Related Posts

Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies Cyber Security News
Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs Cyber Security News
DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass Cyber Security News
Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data Cyber Security News
Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Cyber Security News
Anthropic Challenges U.S. ‘Supply Chain Risk’ Designation Anthropic Challenges U.S. ‘Supply Chain Risk’ Designation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UNC6426 Leverages npm Flaw for Rapid AWS Admin Access
  • Critical Microsoft .NET Vulnerability Demands Immediate Attention
  • Siemens and Schneider Lead ICS Patch Tuesday Updates
  • Critical Gogs Flaw Allows Silent Overwriting of LFS Objects
  • Malicious Rust Crates and AI Bot Threaten Developer Secrets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UNC6426 Leverages npm Flaw for Rapid AWS Admin Access
  • Critical Microsoft .NET Vulnerability Demands Immediate Attention
  • Siemens and Schneider Lead ICS Patch Tuesday Updates
  • Critical Gogs Flaw Allows Silent Overwriting of LFS Objects
  • Malicious Rust Crates and AI Bot Threaten Developer Secrets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News