CVE-2026-23633Path Traversal in Gogs

CWE-22Path Traversal5 documents4 sources
Severity
6.5MEDIUMNVD
EPSS
0.0%
top 91.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 6
Latest updateFeb 17

Description

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, there is an arbitrary file read/write via path traversal in Git hook editing. This issue has been patched in versions 0.13.4 and 0.14.0+dev.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:NExploitability: 1.2 | Impact: 5.2

Affected Packages3 packages

CVEListV5gogs/gogs< 0.14.0+dev
NVDgogs/gogs< 0.13.4
Gogogs.io/gogs< 0.13.4

🔴Vulnerability Details

3
OSV
Gogs has arbitrary file read/write via Path Traversal in Git hook editing in gogs.io/gogs2026-02-17
GHSA
Gogs has arbitrary file read/write via Path Traversal in Git hook editing2026-02-06
OSV
Gogs has arbitrary file read/write via Path Traversal in Git hook editing2026-02-06

🕵️Threat Intelligence

1
Wiz
CVE-2026-23633 Impact, Exploitability, and Mitigation Steps | Wiz