High severityNVD Advisory· Published Feb 6, 2026· Updated Feb 6, 2026
Gogs vulnerable to arbitrary file deletion via path traversal in wiki page update
CVE-2026-24135
Description
Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, a path traversal vulnerability exists in the updateWikiPage function of Gogs. The vulnerability allows an authenticated user with write access to a repository's wiki to delete arbitrary files on the server by manipulating the old_title parameter in the wiki editing form. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
gogs.io/gogsGo | < 0.13.4 | 0.13.4 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-jp7c-wj6q-3qf2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-24135ghsaADVISORY
- github.com/gogs/gogs/security/advisories/GHSA-jp7c-wj6q-3qf2ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.