Moderate severityNVD Advisory· Published Mar 5, 2026· Updated Mar 6, 2026
Gogs: Access tokens get exposed through URL params in API requests
CVE-2026-26196
Description
Gogs is an open source self-hosted Git service. Prior to version 0.14.2, gogs api still accepts tokens in url params like token and access_token, which can leak through logs, browser history, and referrers. This issue has been patched in version 0.14.2.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
gogs.io/gogsGo | <= 0.13.3 | — |
Affected products
1Patches
1295bfba72993context: reject access tokens passed via URL query parameters (#8177)
5 files changed · +12 −33
CHANGELOG.md+1 −0 modified@@ -10,6 +10,7 @@ All notable changes to Gogs are documented in this file. ### Removed +- Support for passing API access tokens via URL query parameters (`token`, `access_token`). Use the `Authorization` header instead. [#8177](https://github.com/gogs/gogs/pull/8177) - [GHSA-x9p5-w45c-7ffc](https://github.com/gogs/gogs/security/advisories/GHSA-x9p5-w45c-7ffc) - The `gogs cert` subcommand. [#8153](https://github.com/gogs/gogs/pull/8153) - The `[email] DISABLE_HELO` configuration option. HELO/EHLO is now always sent during SMTP handshake. [#8164](https://github.com/gogs/gogs/pull/8164) - Support for MSSQL as a database backend. Stay on 0.14 for continued usage. [#8173](https://github.com/gogs/gogs/pull/8173)
.claude/commands/ghsa.md+4 −2 modified@@ -7,5 +7,7 @@ Steps: 4. Propose a fix with a clear explanation of the root cause and how the fix addresses it. Check for prior art in the codebase to stay consistent with existing patterns. 5. Implement the fix. Only add tests when there is something meaningful to test at our layer. 6. Run all the usual build and test commands. -7. Create a branch named after the GHSA ID, commit, and push. -8. Create a pull request with a proper title and description, do not reveal too much detail and link the GHSA. +7. If a changelog entry is warranted (user will specify), add it to CHANGELOG.md with a placeholder for the PR link. +8. Create a branch named after the GHSA ID, commit, and push. +9. Create a pull request with a proper title and description, do not reveal too much detail and link the GHSA. +10. If a changelog entry was added, update it with the PR link, then commit and push again.
docs/api-reference/introduction.mdx+1 −13 modified@@ -55,23 +55,11 @@ There are two ways to authenticate through the Gogs API. Requests that require a </Warning> </Tab> <Tab title="Access token"> - Personal access tokens are the recommended way to authenticate. They can be sent via a request **header** or a **URL query parameter**. - - **Using a header:** + Personal access tokens must be sent via the `Authorization` request header. ```bash curl -H "Authorization: token {YOUR_ACCESS_TOKEN}" https://gogs.example.com/api/v1/user/repos ``` - - **Using a query parameter:** - - ```bash - curl https://gogs.example.com/api/v1/user/repos?token={YOUR_ACCESS_TOKEN} - ``` - - <Tip> - Using the `Authorization` header is preferred over the query parameter, as URLs may be logged by proxies and servers. - </Tip> </Tab> </Tabs>
docs/api-reference/openapi.json+0 −6 modified@@ -5449,12 +5449,6 @@ "in": "header", "name": "Authorization", "description": "Personal access token. Use format: token {YOUR_ACCESS_TOKEN}" - }, - "TokenQuery": { - "type": "apiKey", - "in": "query", - "name": "token", - "description": "Access token as query parameter" } }, "schemas": {
internal/context/auth.go+6 −12 modified@@ -146,18 +146,12 @@ func authenticatedUserID(store AuthStore, c *macaron.Context, sess session.Store // Check access token. if isAPIPath(c.Req.URL.Path) { - tokenSHA := c.Query("token") - if len(tokenSHA) <= 0 { - tokenSHA = c.Query("access_token") - } - if tokenSHA == "" { - // Well, check with header again. - auHead := c.Req.Header.Get("Authorization") - if len(auHead) > 0 { - auths := strings.Fields(auHead) - if len(auths) == 2 && auths[0] == "token" { - tokenSHA = auths[1] - } + var tokenSHA string + auHead := c.Req.Header.Get("Authorization") + if auHead != "" { + auths := strings.Fields(auHead) + if len(auths) == 2 && auths[0] == "token" { + tokenSHA = auths[1] } }
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-x9p5-w45c-7ffcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-26196ghsaADVISORY
- github.com/gogs/gogs/commit/295bfba72993c372e7b338438947d8e1a6bed8fdghsax_refsource_MISCWEB
- github.com/gogs/gogs/pull/8177ghsax_refsource_MISCWEB
- github.com/gogs/gogs/releases/tag/v0.14.2ghsax_refsource_MISCWEB
- github.com/gogs/gogs/security/advisories/GHSA-x9p5-w45c-7ffcghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.