Unauthorized Modification in Gogs Git Service Affects Users
CVE-2026-23632

6.5MEDIUM

Key Information:

Vendor

Gogs

Status
Vendor
CVE Published:
6 February 2026

What is CVE-2026-23632?

Gogs, a self-hosted Git service, suffers from an authorization bypass vulnerability in versions 0.13.3 and earlier. Specifically, the 'PUT /repos/:owner/:repo/contents/*' endpoint fails to enforce write permissions correctly, permitting users with only read permissions to modify repository contents. By exploiting this flaw, an attacker with read access can alter files and commit changes, leveraging a token with insufficient permissions. This critical oversight puts sensitive data and project integrity at risk. The vulnerability is mitigated in versions 0.13.4 and 0.14.0+dev, which include necessary permissions checks to prevent unauthorized modifications.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

gogs < 0.14.0+dev < 0.14.0+dev

gogs < 0.13.4 < 0.13.4

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.