Description

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning after adding a newly discovered Gogs vulnerability to its Known Exploited Vulnerabilities catalog. The flaw, tracked as CVE-2025-8110, affects Gogs, a widely used self-hosted Git service, and is actively being exploited in the wild. The vulnerability carries a high CVSS score of 8.7, underscoring its serious risk to organizations. CVE-2025-8110 is especially concerning because it bypasses an earlier security fix intended to mitigate a remote code execution flaw (CVE-2024-55947). The weakness stems from a symlink-based path traversal bypass, which allows an authenticated attacker to overwrite files outside the intended repository directory. By exploiting this gap, a malicious user can escape application-level restrictions and execute arbitrary code on the underlying server. The issue was first identified as a zero-day on July 10, 2025, by Wiz Research, and subsequent observations confirmed active exploitation. Due to Gogs’ lightweight design and popularity as an alternative to platforms like GitLab, it is commonly deployed in on-premises and cloud environments. Many instances are exposed to the public internet, making them attractive targets for automated attacks. CISA has mandated that Federal Civilian Executive Branch agencies remediate or disconnect affected systems by February 2, 2026. Organizations using Gogs are strongly advised to apply the latest security patches immediately, review access controls, and limit internet exposure to reduce the risk of compromise.