๐Ÿ” CVE Alert

CVE-2026-25229

UNKNOWN 0.0

Gogs Authorization Bypass Allows Cross-Repository Label Modification

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have a broken access control vulnerability which allows authenticated users with write access to any repository to modify labels belonging to other repositories. The UpdateLabel function in the Web UI (internal/route/repo/issue.go) fails to verify that the label being modified belongs to the repository specified in the URL path, enabling cross-repository label tampering attacks. The vulnerability exists in the Web UI's label update endpoint POST /:username/:reponame/labels/edit. The handler function UpdateLabel uses an incorrect database query function that bypasses repository ownership validation. This issue has been fixed in version 0.14.1.

CWE CWE-284
Vendor gogs
Product gogs
Published Feb 19, 2026
Last Updated Feb 19, 2026
Stay Ahead of the Next One

Get instant alerts for gogs gogs

Be the first to know when new unknown vulnerabilities affecting gogs gogs are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

gogs / gogs
< 0.14.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/gogs/gogs/security/advisories/GHSA-cv22-72px-f4gh github.com: https://github.com/gogs/gogs/commit/643a6d6353cb6a182a4e1f0720228727f30a3ad2