CVE-2026-25242: Gogs RCE — Critical — Patch Now [PoC]
CVE-2026-25242
Gogs is an open source self-hosted Git service. Versions 0.13.4 and below expose unauthenticated file upload endpoints by default. When the global RequireSigninView setting is disabled (default), any ...
Overview
A critical security vulnerability has been identified in Gogs, a popular self-hosted Git service. This flaw allows unauthenticated attackers to upload any file to a vulnerable server, effectively turning it into an unsecured public file host.
Vulnerability Details
In affected versions (0.13.4 and below), two specific web endpoints-/releases/attachments and /issues/attachments-do not properly check if a user is logged in when the global RequireSigninView setting is disabled. This setting is disabled by default. Consequently, any remote user can directly upload files without providing any credentials. Standard CSRF (Cross-Site Request Forgery) protections are ineffective because the server still issues session cookies for these requests.
Potential Impact
The impact of this vulnerability is severe and multifaceted:
- Disk Exhaustion: Attackers can rapidly fill the server’s disk space with large or numerous files, causing a denial of service and disrupting the Git service and any other applications on the host.
- Malware Hosting: The server can be used to store and distribute malicious software, scripts, or phishing pages, damaging the reputation of the organization hosting the Gogs instance.
- Content Hosting: The instance could be abused to host illegal or unauthorized content, creating legal and operational risks.
- Data Integrity: The integrity and intended use of the server are completely compromised.
This vulnerability is remotely exploitable without any authentication, contributing to its critical severity rating of 9.8 on the CVSS scale.
Remediation and Mitigation
Immediate action is required to secure affected Gogs instances.
Primary Fix: The only complete solution is to upgrade Gogs to version 0.14.1 or later. This update corrects the authorization check on the affected endpoints. Always test upgrades in a staging environment before applying them to production.
Immediate Mitigation:
If upgrading is not immediately possible, enable the RequireSigninView global setting. This will force authentication for all views and should block unauthenticated access to the upload endpoints.
- Navigate to Administration Panel -> Configuration -> Server.
- Set
REQUIRE_SIGNIN_VIEWtotrue. - Restart your Gogs application.
Additional Measures:
- Review server directories (notably the
attachmentsfolders) for any suspicious files uploaded since installation. - Ensure your Gogs instance is not directly exposed to the internet unless necessary. Place it behind a firewall or reverse proxy with strict access controls.
- Monitor server disk usage and system logs for unusual activity.
All users and administrators of Gogs versions 0.13.4 and below should apply the upgrade or mitigation without delay.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-25242?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| mindkernel/CVE-2026-25242 PoC for CVE-2026-25242 gogs unauthenticated file upload | ★ 0 |
Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.
Related Advisories
Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the restoreTenant admin mutation is missing from the authorization middleware config (admin.go), making it completely unauthenti...
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yayma...
The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. This is due to improper authorization enforcement in the activate...
act is a project which allows for local running of github actions. Prior to version 0.2.86, act's built in actions/cache server listens to connections on all interfaces and allows anyone who can conne...