CVE-2025-64175Improper Authentication in Gogs

Severity
7.7HIGHNVD
EPSS
0.0%
top 94.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 6
Latest updateFeb 17

Description

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, Gogs’ 2FA recovery code validation does not scope codes by user, enabling cross-account bypass. If an attacker knows a victim’s username and password, they can use any unused recovery code (e.g., from their own account) to bypass the victim’s 2FA. This enables full account takeover and renders 2FA ineffective in all environments where it's enabled.. This issue has been patched in versions 0.13.4 and 0.14.0+dev.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages3 packages

CVEListV5gogs/gogs< 0.14.0+dev
NVDgogs/gogs< 0.13.4
Gogogs.io/gogs0.11.190.13.4+1

🔴Vulnerability Details

3
OSV
Gogs Vulnerable to 2FA Bypass via Recovery Code in gogs.io/gogs2026-02-17
GHSA
Gogs Vulnerable to 2FA Bypass via Recovery Code2026-02-06
OSV
Gogs Vulnerable to 2FA Bypass via Recovery Code2026-02-06

🕵️Threat Intelligence

1
Wiz
CVE-2025-64175 Impact, Exploitability, and Mitigation Steps | Wiz