VYPR
Moderate severityNVD Advisory· Published Feb 19, 2026· Updated Feb 19, 2026

Gogs allows unauthenticated file uploads

CVE-2026-25242

Description

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below expose unauthenticated file upload endpoints by default. When the global RequireSigninView setting is disabled (default), any remote user can upload arbitrary files to the server via /releases/attachments and /issues/attachments. This enables the instance to be abused as a public file host, potentially leading to disk exhaustion, content hosting, or delivery of malware. CSRF tokens do not mitigate this attack due to same-origin cookie issuance. This issue has been fixed in version 0.14.1.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
gogs.io/gogsGo
< 0.14.10.14.1

Affected products

1

Patches

1
628216d5889f

security: require authentication for attachment uploads (#8128)

https://github.com/gogs/gogsᴊᴏᴇ ᴄʜᴇɴJan 31, 2026via ghsa
1 file changed · +4 1
  • internal/cmd/web.go+4 1 modified
    @@ -329,9 +329,12 @@ func runWeb(c *cli.Context) error {
     					return
     				}
     			})
    +		}, ignSignIn)
    +
    +		m.Group("", func() {
     			m.Post("/issues/attachments", repo.UploadIssueAttachment)
     			m.Post("/releases/attachments", repo.UploadReleaseAttachment)
    -		}, ignSignIn)
    +		}, reqSignIn)
     
     		m.Group("/:username", func() {
     			m.Post("/action/:action", user.Action)
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.