Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Unpatched Gogs Zero-Day Exploited for Months

Unpatched Gogs Zero-Day Exploited for Months

Posted on December 11, 2025December 11, 2025 By CWS

Greater than 700 Gogs cases have been compromised by way of an unpatched zero-day vulnerability within the self-hosted Git service, cybersecurity agency Wiz warns.

Tracked as CVE-2025-8110, the exploited safety defect is described as an improper symbolic hyperlink dealing with subject within the PutContents API.

The weak point permits authenticated attackers to overwrite information exterior the repository and obtain distant code execution, explains Wiz, which recognized and reported the bug in July.

The problem, the cybersecurity outfit explains, is a symlink bypass of CVE-2024-55947, a path traversal flaw within the Gogs file replace API.

Patched in December 2024 in Gogs model 0.13.1, CVE-2024-55947 allowed attackers to jot down information to arbitrary paths on the server, equivalent to delicate system information or configuration information.

Profitable exploitation of the vulnerability would offer attackers with SSH entry to the affected servers.

The repair for the flaw added enter validation on the trail parameter, however didn’t account for symbolic hyperlinks, and risk actors have been abusing this assault vector for months.

That is potential as a result of Git and Gogs assist using symbolic hyperlinks, which can level to things exterior the repository, and the Gogs API permits the modification of information exterior the git protocol. Moreover, the Gogs API doesn’t validate the vacation spot of a symbolic hyperlink.Commercial. Scroll to proceed studying.

“As a result of Gogs respects commonplace Git conduct, it permits customers to commit symbolic hyperlinks to repositories. The vulnerability arises as a result of the API writes to the file path with out checking if the goal file is a symlink pointing exterior the repo. This successfully renders the earlier path validation ineffective if a symlink is concerned,” Wiz explains.

To take advantage of the vulnerability, risk actors create new Git repositories, commit a symbolic hyperlink pointing to a delicate goal, write knowledge to the symlink utilizing the PutContents API, and overwrite .git/config to attain arbitrary command execution.

In accordance with Wiz, there are over 1,400 uncovered Gogs cases and risk actors have compromised greater than 700 to this point.

“All contaminated cases shared the identical sample: 8-character random proprietor/repo names created inside the identical quick time window (July tenth). This implies {that a} single actor, or maybe a bunch of actors all utilizing the identical tooling, are accountable for all infections,” Wiz explains.

All Gogs servers working model 0.13.3 or older are susceptible to CVE-2025-8110 if they’re uncovered to the web and have open-registration enabled.

The Gogs maintainers are engaged on a repair for this vulnerability, however as of December 10, no patch is accessible.

Associated: IBM Patches Over 100 Vulnerabilities

Associated: Google Patches Mysterious Chrome Zero-Day Exploited within the Wild

Associated: Google Patches Gemini Enterprise Vulnerability Exposing Company Knowledge

Associated: Fortinet Patches Essential Authentication Bypass Vulnerabilities

Security Week News Tags:Exploited, Gogs, Months, Unpatched, ZeroDay

Post navigation

Previous Post: The Impact of Robotic Process Automation (RPA) on Identity and Access Management
Next Post: Wide Range of Malware Delivered in React2Shell Attacks

Related Posts

Global Crackdown on Aisuru and Kimwolf Botnets Global Crackdown on Aisuru and Kimwolf Botnets Security Week News
TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Attacks TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Attacks Security Week News
F5 to Acquire CalypsoAI for 0 Million F5 to Acquire CalypsoAI for $180 Million Security Week News
RSAC 2026: Key Highlights from Days 3-4 RSAC 2026: Key Highlights from Days 3-4 Security Week News
Monnai Raises  Million for Identity and Risk Data Infrastructure Monnai Raises $12 Million for Identity and Risk Data Infrastructure Security Week News
Echo Raises  Million in Series A Funding Echo Raises $35 Million in Series A Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark