The US government must fix a high-severity security issue with Gogs or face an attack


  • CISA added Gogs CVE-2025-8110 to its catalog of known exploited vulnerabilities
  • Critical Symlink Bypass Allows Unauthenticated Remote Code Execution via PutContents API
  • More than 700 Gogs servers compromised; agencies must update by February 2, 2026

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a new bug to its Catalog of Known Exploited Vulnerabilities (KEVs), not only reporting that it is actively exploited in the wild, but also ordering Federal Civilian Executive Branch (FCEB) agencies to patch it or stop using the vulnerable software altogether.

The software at risk is Gogs, a self-hosted Git service that allows organizations to manage their own private alternatives to Github or GitLab.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top