Gogs 0-Day Exploited in the Wild
wiz.io·4d·
Discuss: Hacker News
🦀Rust
Preview
Report Post

Executive Summary

While investigating a malware infection on a customer workload, Wiz Research discovered an active zero-day vulnerability in Gogs, a popular self-hosted Git service.

A symlink bypass (CVE-2025-8110) of a previously patched RCE (CVE-2024-55947) allows authenticated users to overwrite files outside the repository, leading to Remote Code Execution (RCE).

We identified over 700 compromised instances public-facing on the internet.

As of December 1, 2025, active exploitation is ongoing, and a patch is not yet available.

Introduction

On July 10th, the Wiz Threat Research team observed malware findings on public-facing instances of Gogs, a popular self-hosted Git service. What began as a routine investigation into an infected machine turned into the…

Similar Posts

Loading similar posts...