Description
Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have a broken access control vulnerability which allows authenticated users with write access to any repository to modify labels belonging to other repositories. The UpdateLabel function in the Web UI (internal/route/repo/issue.go) fails to verify that the label being modified belongs to the repository specified in the URL path, enabling cross-repository label tampering attacks. The vulnerability exists in the Web UI's label update endpoint POST /:username/:reponame/labels/edit. The handler function UpdateLabel uses an incorrect database query function that bypasses repository ownership validation. This issue has been fixed in version 0.14.1.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/gogs/gogs/security/advisories/GHSA-cv22-72px-f4gh
Patch x_refsource_misc
https://github.com/gogs/gogs/commit/643a6d6353cb6a182a4e1f0720228727f30a3ad2
Scores
CVSS v3
6.5
EPSS
0.0004
EPSS Percentile
13.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-284
Status
published
Products (2)
gogs/gogs
< 0.14.1
gogs.io/gogs
0 - 0.14.0Go
Published
Feb 19, 2026
Tracked Since
Feb 19, 2026