Remote Command Execution Vulnerability in Gogs by Gogs
CVE-2025-64111
What is CVE-2025-64111?
CVE-2025-64111 is a remote command execution vulnerability affecting Gogs, an open-source, self-hosted Git service widely used for version control and collaborative software development. The vulnerability arises from a flaw in versions prior to 0.13.4 where insufficiently patched security measures allowed attackers to manipulate files within the .git directory. This exploitation could lead to arbitrary code execution on the server, severely compromising the integrity and security of the hosted applications and data. Organizations using Gogs to manage their code repositories may find themselves at risk of unauthorized access, leading to potential data loss or leakage, operational disruption, or the deployment of malicious code onto their servers.
Potential Impact of CVE-2025-64111
-
Remote Command Execution: The vulnerability permits an attacker to execute arbitrary commands on the host server, which can lead to complete system takeover and unauthorized access to sensitive information.
-
Data Integrity and Confidentiality Risks: Successful exploitation could allow malicious users to not only manipulate or delete code repositories but also to exfiltrate sensitive data, leading to critical information leaks and damaging consequences for the organization.
-
Operational Disruption: The ability to execute commands remotely can result in significant downtime or disruption of services, ultimately impacting the organization's operational capabilities and credibility among users or clients.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
gogs < 0.14.0+dev < 0.14.0+dev
gogs < 0.13.4 < 0.13.4
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
