The Nimble Nerd white logo

Gogs Zero-Day Chaos: Hackers Pull Off 700 Server Heist! 🚨

A critical Gogs zero-day vulnerability has led to the compromise of about 700 servers. Exploited by hackers, this flaw in the PutContents API allows remote code execution. Gogs admins, check your servers before your Git gets gory!

Pro Dashboard

Hot Take:

Why did the hacker break into the Gogs server? Because they wanted to git some fresh code! But really, this Gogs zero-day is no laughing matter, as it’s left 700 servers compromised and many sysadmins feeling like they’re on a git list for a holiday they didn’t ask for. Time to patch up those gaps before more servers end up in a repo of despair!

Key Points:

  • A zero-day vulnerability in Gogs, a self-hosted Git service, led to the compromise of over 700 servers.
  • The flaw, CVE-2025-8110, allows remote code execution due to a path-traversal issue in the PutContents API.
  • Attackers exploited symbolic links to overwrite files outside repositories, leading to system compromise.
  • Over 1,400 public Gogs instances were exposed, with more than 50% showing signs of compromise.
  • The vulnerability has not yet been patched, and a second wave of attacks was reported.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?