What's Happening?
A zero-day vulnerability in Gogs, a self-hosted Git service, has been exploited for months, compromising over 700 instances. The flaw, identified as CVE-2025-8110, involves improper symbolic link handling in the PutContents API, allowing attackers to
overwrite files and execute remote code. Cybersecurity firm Wiz reported the issue in July, but no patch is available as of December 10. The vulnerability is a symlink bypass of a previously patched path traversal flaw, CVE-2024-55947. Attackers have used this to gain SSH access to servers by creating repositories with symbolic links pointing to sensitive targets. The exploit has affected Gogs servers exposed to the internet with open registration enabled.
Why It's Important?
This vulnerability highlights significant security risks in open-source software, emphasizing the need for timely patches and robust security practices. The widespread exploitation of Gogs instances demonstrates the potential impact of unpatched vulnerabilities on organizations relying on self-hosted services. The incident underscores the importance of cybersecurity vigilance and the challenges in maintaining secure software environments. Organizations using Gogs must assess their exposure and implement mitigations to protect against potential breaches. The situation also raises awareness about the need for improved security measures in open-source projects, potentially influencing future development practices.
What's Next?
Gogs maintainers are working on a fix for the vulnerability, but the timeline for a patch release is unclear. Affected organizations should consider implementing temporary mitigations, such as restricting access to Gogs instances and disabling open registration. The cybersecurity community may increase efforts to identify and address similar vulnerabilities in other open-source projects. The incident could lead to broader discussions on improving security practices in open-source software development, potentially resulting in new guidelines or standards.











