Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Home/CyberSecurity News/CISA: Gogs Path Traversal Vulnerability Actively Warns Exploited
CyberSecurity News

CISA: Gogs Path Traversal Vulnerability Actively Warns Exploited

A critical warning has been issued regarding a path traversal vulnerability in Gogs, a self-hosted Git service, which is actively exploited in the wild. The vulnerability, tracked as CVE-2025-8110,...

Jennifer sherman
Jennifer sherman
January 13, 2026 2 Min Read
2 0

A critical warning has been issued regarding a path traversal vulnerability in Gogs, a self-hosted Git service, which is actively exploited in the wild.

The vulnerability, tracked as CVE-2025-8110, was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on January 12, 2026, signaling active exploitation by threat actors.

CVE ID CVE-2025-8110
Vulnerability Type Path Traversal – Improper Symbolic Link Handling
Related CWE CWE-22
Impact Code Execution

CVE-2025-8110 affects Gogs and stems from improper symbolic link handling in the PutContents API. This path traversal flaw allows attackers to escape restricted directories and potentially execute arbitrary code on vulnerable systems.

The vulnerability is associated with CWE-22, which describes improper limitation of pathnames to restricted directories.

Path traversal vulnerabilities occur when attackers use special elements, such as “../” sequences, to navigate outside intended directories and access sensitive files or execute malicious code.

In Gogs’ case, the flaw in symbolic link handling creates an opportunity for attackers to manipulate file paths and achieve code execution.

CISA’s addition of CVE-2025-8110 to the KEV catalog indicates that threat actors are actively exploiting this vulnerability in real-world attacks.

While it remains unknown whether the flaw is being used in ransomware campaigns, the potential for code execution makes it a severe security risk for organizations running affected Gogs installations.

Federal agencies must address this vulnerability by February 2, 2026, according to Binding Operational Directive (BOD) 22-01.

Organizations are urged to apply vendor-supplied patches and mitigations immediately. For cloud service deployments, administrators should follow the guidance in BOD 22-01.

If mitigations are unavailable, CISA recommends discontinuing use of the vulnerable product.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchransomwareSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

DPRK’s Remote Workers Generating $600M Using Identity Theft to

Next Post

New Angular Vulnerability Allows Malicious Code Execution

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us