CVE-2026-25229Improper Access Control in Gogs

Severity
5.3MEDIUMNVD
EPSS
0.0%
top 88.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 19
Latest updateFeb 23

Description

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have a broken access control vulnerability which allows authenticated users with write access to any repository to modify labels belonging to other repositories. The UpdateLabel function in the Web UI (internal/route/repo/issue.go) fails to verify that the label being modified belongs to the repository specified in the URL path, enabling cross-repository label tampering attacks. The vulnerability exists in the Web UI's lab

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDgogs/gogs< 0.14.1
Gogogs.io/gogs< 0.14.0

Patches

🔴Vulnerability Details

3
OSV
Gogs has an Authorization Bypass Allows Cross-Repository Label Modification in Gogs in gogs.io/gogs2026-02-23
GHSA
Gogs has an Authorization Bypass Allows Cross-Repository Label Modification in Gogs2026-02-17
OSV
Gogs has an Authorization Bypass Allows Cross-Repository Label Modification in Gogs2026-02-17

🕵️Threat Intelligence

1
Wiz
CVE-2026-25229 Impact, Exploitability, and Mitigation Steps | Wiz