CVE-2022-27313
Description
An arbitrary file deletion vulnerability in Gitea v1.16.3 allows attackers to cause a Denial of Service (DoS) via deleting the configuration file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Gitea v1.16.3 allows attackers to delete the configuration file via an arbitrary file deletion vulnerability, leading to denial of service.
Vulnerability
An arbitrary file deletion vulnerability exists in Gitea version 1.16.3 [1]. The issue allows an attacker to delete the configuration file (app.ini), causing the instance to become inoperable. The exact code path is not publicly detailed, but the vulnerability is present in the default configuration and does not require any special settings.
Exploitation
An attacker with authenticated access (likely user-level privileges) can exploit the vulnerability to delete the configuration file. The specific steps are not disclosed, but the attack is feasible without administrative rights.
Impact
Successful exploitation leads to the deletion of the Gitea configuration file, resulting in a denial of service (DoS) as the instance fails to start or operate correctly. No data corruption or remote code execution is associated with this CVE.
Mitigation
The vulnerability is fixed in Gitea version 1.16.4, released on March 14, 2022 [2][3]. Users should upgrade to this version or later. No workaround is available for earlier versions.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
code.gitea.io/giteaGo | < 1.16.4 | 1.16.4 |
Affected products
3- Gitea/Giteadescription
- osv-coords2 versions
>= 1.16.3, < 1.16.4+ 1 more
- (no CPE)range: >= 1.16.3, < 1.16.4
- (no CPE)range: < 1.16.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-g7p7-x6w7-w6qgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-27313ghsaADVISORY
- github.com/go-gitea/gitea/pull/19072ghsax_refsource_MISCWEB
- github.com/go-gitea/gitea/releases/tag/v1.16.4ghsaWEB
News mentions
0No linked articles in our index yet.