Metrics
Affected Vendors & Products
Thu, 19 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 19 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gogs
Gogs gogs |
|
| Vendors & Products |
Gogs
Gogs gogs |
Thu, 19 Feb 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have a broken access control vulnerability which allows authenticated users with write access to any repository to modify labels belonging to other repositories. The UpdateLabel function in the Web UI (internal/route/repo/issue.go) fails to verify that the label being modified belongs to the repository specified in the URL path, enabling cross-repository label tampering attacks. The vulnerability exists in the Web UI's label update endpoint POST /:username/:reponame/labels/edit. The handler function UpdateLabel uses an incorrect database query function that bypasses repository ownership validation. This issue has been fixed in version 0.14.1. | |
| Title | Gogs Authorization Bypass Allows Cross-Repository Label Modification | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-19T17:44:28.915Z
Reserved: 2026-01-30T14:44:47.328Z
Link: CVE-2026-25229
Updated: 2026-02-19T17:04:52.892Z
Status : Analyzed
Published: 2026-02-19T07:17:45.363
Modified: 2026-02-19T19:45:35.503
Link: CVE-2026-25229
No data.