CVE-2026-25229
Gogs vulnerability analysis and mitigation

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have a broken access control vulnerability which allows authenticated users with write access to any repository to modify labels belonging to other repositories. The UpdateLabel function in the Web UI (internal/route/repo/issue.go) fails to verify that the label being modified belongs to the repository specified in the URL path, enabling cross-repository label tampering attacks. The vulnerability exists in the Web UI's label update endpoint POST /:username/:reponame/labels/edit. The handler function UpdateLabel uses an incorrect database query function that bypasses repository ownership validation. This issue has been fixed in version 0.14.1.


SourceNVD

Related Gogs vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-26194HIGH8.8
  • GogsGogs
  • gogs.io/gogs
NoYesMar 05, 2026
CVE-2026-26196MEDIUM6.9
  • GogsGogs
  • gogs
NoYesMar 05, 2026
CVE-2026-26195MEDIUM6.9
  • GogsGogs
  • gogs
NoYesMar 05, 2026
CVE-2026-26276MEDIUM5.4
  • GogsGogs
  • gogs
NoYesMar 05, 2026
CVE-2026-26022MEDIUM5.4
  • GogsGogs
  • gogs.io/gogs
NoYesMar 05, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management