Jan 1, 2026·4 min read·15 visits
Gogs tried to stop hackers from deleting `.git` files by checking file names. Hackers bypassed this by using symbolic links (e.g., `evil_link` -> `.git/config`). By editing the symlink via the Web UI, attackers can overwrite Git hooks and achieve full RCE. CVSS 10.0.
A critical Remote Command Execution vulnerability in Gogs versions prior to 0.13.3. This flaw is a bypass of a previous fix (CVE-2024-39931), allowing authenticated users to overwrite internal Git files via symbolic links.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
Gogs Gogs | < 0.13.3 | 0.13.3 |
| Attribute | Detail |
|---|---|
| CWE | CWE-59 (Link Following) |
| Attack Vector | Network (Authenticated) |
| CVSS | 10.0 (Critical) |
| Impact | Remote Command Execution (RCE) |
| Privileges | Low (Any authenticated user) |
| Fix Version | 0.13.3 |
Improper Link Resolution Before File Access ('Link Following')