CVE-2025-8110: Gogs <= 0.13.3 - Remote Code Execution

日期: 2026-01-24 | 影响软件: Gogs | POC: 已公开

漏洞描述

Gogs self-hosted Git service versions 0.13.3 and earlier contain a critical symlink bypass vulnerability that circumvents the fix for CVE-2024-55947. Authenticated users can exploit improper symbolic link handling in the PutContents API to overwrite files outside the repository by committing a symlink pointing to sensitive targets, leading to remote code execution. As of December 2025, this remains an unpatched zero-day with active exploitation ongoing. Approximately 1,400 exposed Gogs instances exist, with over 700 showing signs of compromise. The vulnerability stems from the API writing to file paths without checking if targets are symlinks pointing outside the repository. Gogs maintainers are working on a fix.

PoC代码[已公开]

id: CVE-2025-8110

info:
  name: Gogs <= 0.13.3 - Remote Code Execution
  author: rxerium
  severity: high
  description: |
    Gogs self-hosted Git service versions 0.13.3 and earlier contain a critical symlink bypass vulnerability that circumvents the fix for CVE-2024-55947. Authenticated users can exploit improper symbolic link handling in the PutContents API to overwrite files outside the repository by committing a symlink pointing to sensitive targets, leading to remote code execution. As of December 2025, this remains an unpatched zero-day with active exploitation ongoing. Approximately 1,400 exposed Gogs instances exist, with over 700 showing signs of compromise. The vulnerability stems from the API writing to file paths without checking if targets are symlinks pointing outside the repository. Gogs maintainers are working on a fix.
  remediation: |
    Update to the latest version of Gogs.
  impact: |
    Local attackers can execute arbitrary code, potentially leading to full system compromise.
  reference:
    - https://www.wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit
    - https://thehackernews.com/2025/12/unpatched-gogs-zero-day-exploited.html
    - https://github.com/advisories/ghsa-mq8m-42gh-wq7r
    - https://nvd.nist.gov/vuln/detail/CVE-2025-8110
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 8.8
    cve-id: CVE-2025-8110
    epss-score: 0.0232
    epss-percentile: 0.84392
    cwe-id: CWE-22
  metadata:
    verified: true
    vendor: gogs
    product: gogs
    max-request: 1
    shodan-query: http.title:"Sign In - Gogs"
  tags: cve,cve2025,gogs,git,symlink,rce,kev,vkev,passive

http:
  - method: GET
    path:
      - "{{BaseURL}}/user/login"

    extractors:
      - type: regex
        name: version
        group: 1
        regex:
          - 'Gogs Version: ([0-9.]+)'

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(body, "Sign In - Gogs: Go Git Service")'
          - 'compare_versions(version, "<= 0.13.3")'
        condition: and
# digest: 4b0a004830460221009db776f6ab9e835afe80a8a88c8d23dd569f5f9db08eb54ff661d7128f86535f022100b212eb436d562d7829a469ea10ef9d7704f2dde566d12f9b7e59dd3dfe297548:922c64590222798bb761d5b6d8e72950

相关漏洞推荐