Gogs is an open source self-hosted Git service. In application version 0.14.0+dev and prior, there is a stored cross-site scripting (XSS) vulnerability present in Gogs, which allows client-side Javascript code execution. The vulnerability is caused by the usage of a vulnerable and outdated component: pdfjs-1.4.20 under public/plugins/. This issue has been fixed for gogs.io/gogs in version 0.13.3.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Jun 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Jun 2025 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Gogs is an open source self-hosted Git service. In application version 0.14.0+dev and prior, there is a stored cross-site scripting (XSS) vulnerability present in Gogs, which allows client-side Javascript code execution. The vulnerability is caused by the usage of a vulnerable and outdated component: pdfjs-1.4.20 under public/plugins/. This issue has been fixed for gogs.io/gogs in version 0.13.3. | |
Title | Gogs stored XSS in PDF renderer | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-24T21:48:47.649Z
Reserved: 2025-05-14T10:32:43.530Z
Link: CVE-2025-47943

Updated: 2025-06-24T21:48:42.035Z

Status : Awaiting Analysis
Published: 2025-06-24T04:15:46.743
Modified: 2025-06-26T18:58:14.280
Link: CVE-2025-47943

No data.