Description
Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code.
Exploits (18)
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-8110
nomisec
WORKING POC
6 stars
by zAbuQasem · remote-auth
https://github.com/zAbuQasem/gogs-CVE-2025-8110
nomisec
WORKING POC
1 stars
by George0Papasotiriou · poc
https://github.com/George0Papasotiriou/CVE-2025-8110-Gogs-Remote-Code-Execution
nomisec
WORKING POC
by hassan-hamadi · remote
https://github.com/hassan-hamadi/CVE-2025-8110-Silentium-HTB
nomisec
WORKING POC
by NetsecBandit · remote-auth
https://github.com/NetsecBandit/CVE-2025-8110-Exploit
nomisec
WORKING POC
by manbahadurthapa1248 · poc
https://github.com/manbahadurthapa1248/CVE-2025-8110-Authenticated-Remote-Code-Execution-on-Gogs-v0.13.3-
Nuclei Templates (1)
Gogs <= 0.13.3 - Remote Code Execution
HIGHVERIFIEDby rxerium
Shodan:
http.title:"Sign In - Gogs"
References (9)
Scores
CVSS v3
8.8
EPSS
0.2140
EPSS Percentile
95.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+13 more repos
Details
CISA KEV
2026-01-12
VulnCheck KEV
2025-12-10
ENISA EUVD
EUVD-2025-202425
CWE
CWE-22
Status
published
Products (2)
gogs/gogs
< 0.13.3
gogs.io/gogs
0Go
Published
Dec 10, 2025
KEV Added
Jan 12, 2026
Tracked Since
Feb 18, 2026