US Government Told to Fix Gogs High-Severity Security Issue or Face Attack



  • CISA added Gogs CVE-2025-8110 to its catalog of known exploited vulnerabilities
  • Bypassing critical symlinks allows unauthenticated remote code execution via the PutContents API
  • More than 700 Gogs servers compromised; agencies must patch by February 2, 2026

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a new bug to its catalog of Known Exploited Vulnerabilities (KEV), indicating not only that it is being actively exploited in the wild, but also directing Federal Civil Executive Branch (FCEB) agencies to patch it or stop using the vulnerable software altogether.

The software at risk is Gogs, a self-hosted Git service that allows organizations to run their own private alternatives to Github or GitLab.



Leave a Comment

Your email address will not be published. Required fields are marked *