Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Posted on January 13, 2026January 13, 2026 By CWS

Jan 13, 2026Ravie LakshmananVulnerability / Community Safety
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has warned of energetic exploitation of a high-severity safety flaw impacting Gogs by including it to its Identified Exploited Vulnerabilities (KEV) catalog.
The vulnerability, tracked as CVE-2025-8110 (CVSS rating: 8.7), pertains to a case of path traversal within the repository file editor that would lead to code execution.
“Gogs Path Traversal Vulnerability: Gogs accommodates a path traversal vulnerability affecting improper Symbolic hyperlink dealing with within the PutContents API that would permit for code execution,” CISA stated in an advisory.
Particulars of the shortcoming got here to gentle final month when Wiz stated it found it being exploited in zero-day assaults. The vulnerability basically bypasses protections put in place for CVE-2024-55947 to attain code execution by making a git repository, committing a symbolic hyperlink pointing to a delicate goal, and utilizing the PutContents API to write down information to the symlink.

This, in flip, causes the underlying working system to navigate to the precise file the symlink factors to and overwrites the goal file outdoors the repository. An attacker might leverage this habits to overwrite Git configuration information, particularly the sshCommand setting, giving them code execution privileges.
Wiz stated it recognized 700 compromised Gogs cases. In accordance with information from the assault floor administration platform Censys, there are about 1,600 internet-exposed Gogs servers, out of which nearly all of them are situated in China (991), the U.S. (146), Germany (98), Hong Kong (56), and Russia (49).
There are at the moment no patches that tackle CVE-2025-8110, though pull requests on GitHub present that the required code modifications have been made. “As soon as the picture is constructed on important, each gogs/gogs:newest and gogs/gogs:next-latest could have this CVE patched,” one of many challenge maintainers stated final week.
Within the absence of a repair, Gogs customers are suggested to disable the default open-registration setting and restrict server entry utilizing a VPN or an allow-list. Federal Civilian Government Department (FCEB) companies are required to use the required mitigations by February 2, 2026.

The Hacker News Tags:Active, CISA, Code, Enabling, Execution, Exploitation, Gogs, Vulnerability, Warns

Post navigation

Previous Post: Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets
Next Post: Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins

Related Posts

How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines The Hacker News
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers The Hacker News
HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks The Hacker News
SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws The Hacker News
SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root The Hacker News
Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark