Cyber Posture

CVE-2025-64111

CriticalPublic PoC

Published: 06 February 2026

Published
06 February 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0023 45.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, due to the insufficient patch for CVE-2024-56731, it's still possible to update files in the .git directory and achieve remote command execution. This issue has been patched…

more

in versions 0.13.4 and 0.14.0+dev.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring timely patching of the insufficient fix for .git directory file updates leading to remote command execution.

prevent

Prevents OS command injection (CWE-78) by validating and sanitizing inputs used to update files in the .git directory.

detect

Enables identification of the specific Gogs vulnerability through vulnerability scanning, facilitating remediation.

Security SummaryAI

CVE-2025-64111 is a critical vulnerability in Gogs, an open source self-hosted Git service, affecting versions 0.13.3 and prior. It stems from an insufficient patch for the prior CVE-2024-56731, which still allows attackers to update files in the .git directory and achieve remote command execution. Classified under CWE-78 (OS Command Injection), the flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Successful exploitation enables full remote command execution on the Gogs server, compromising confidentiality, integrity, and availability with high impact.

The issue has been patched in Gogs versions 0.13.4 and 0.14.0+dev. Security practitioners are advised to upgrade to these versions immediately. Additional details are available in the GitHub Security Advisory at https://github.com/gogs/gogs/security/advisories/GHSA-gg64-xxr9-qhjp.

Details

CWE(s)

Affected Products

gogs
gogs
≤ 0.13.4

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote command execution via OS command injection in a public-facing self-hosted Git service (Gogs), directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References