Gogs Git Service Vulnerability: Hackers Pull a Fast One on 700+ Servers!

The Gogs RCE vulnerability, CVE-2025-8110, is causing chaos as attackers exploit it to take over servers. This zero-day flaw sneaks in through symbolic links, bypassing previous fixes. Gogs users should batten down the hatches by disabling open registration and checking for any suspicious activity before their servers become hacker hotels.

Pro Dashboard

Hot Take:

Looks like Gogs took a page from the book of “How to Make Cybersecurity Experts Sweat Profusely.” With more holes than a block of Swiss cheese, this self-hosted Git service might just need a new name—something like “Googs,” because that’s what you’ll be doing a lot of to solve these problems. Here’s hoping they patch things up before their users start feeling like they’re living in a phishing village!

Key Points:

  • Gogs, a popular self-hosted Git service, has a zero-day vulnerability allowing remote code execution.
  • The vulnerability, CVE-2025-8110, stems from a path traversal weakness in the PutContents API.
  • Over 1,400 Gogs servers are exposed online, with more than 700 showing signs of compromise.
  • The malware used exploits Supershell, an open-source command-and-control (C2) framework.
  • Users are advised to disable open registration and use VPNs to secure their servers.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?