Gogs Git Gaffe: 700+ Instances Hacked Amid Critical Security Flaw Exploitation
A new security vulnerability, CVE-2025-8110, is being actively exploited in Gogs, with over 700 compromised instances reported. Attackers are using symbolic links for code execution, leaving behind obvious trails of their antics. Users should disable open-registration and scan for mysterious 8-character repository names to avoid falling victim to this digital circus.

Hot Take:
Who knew that the secret sauce to security breaches could be something as simple as a symbolic link? Gogs just got outrun in the race against cyber villains by their own symlinks, and now they’re scrambling to patch things up. In a classic game of “Patch, Please!”, the vulnerability CVE-2025-8110 is like an open invitation to hackers for a “smash-and-grab” extravaganza. But hey, at least the attackers were kind enough to leave behind their calling cards in the form of randomly named repositories. That’s what we call cyber courtesy!
Key Points:
- Gogs’ CVE-2025-8110 vulnerability is actively exploited, jeopardizing over 700 instances.
- The flaw allows for arbitrary code execution via symbolic link manipulation.
- Attackers are employing Supershell C2 framework for reverse SSH shell access.
- More than 700 Gogs instances show signs of compromise with 8-character repo names.
- No fix yet; users should limit internet exposure and scan for suspicious repositories.
