Jan 2, 2026·6 min read·23 visits
Gitea versions prior to 1.25.2 respond differently to login attempts depending on whether the username exists or not. Attackers can use this 'oracle' to build a list of valid users, paving the way for targeted credential stuffing or social engineering attacks.
A classic response discrepancy vulnerability in Gitea's API authentication logic allows unauthenticated attackers to enumerate valid usernames based on specific error messages.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N| Product | Affected Versions | Fixed Version |
|---|---|---|
Gitea Gitea | < 1.25.2 | 1.25.2 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-204 |
| Attack Vector | Network (API) |
| CVSS Score | 5.3 (Medium) |
| Impact | Information Disclosure |
| Exploit Status | Trivial (Manual) |
| Authentication | None Required |
Observable Response Discrepancy