Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Spotify Developers Haven’t Written Code Since December Thanks to AI Transformation

    February 16, 2026

    DHS Issues Hundreds Of Subpoenas To Unmask Anonymous ‘Anti-ICE’ Social Media Accounts

    February 16, 2026

    UK Kids Turning to AI Chatbots and Acting on Advice at Alarming Rates

    February 16, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    • Get In Touch
    Facebook X (Twitter) LinkedIn
    TallwireTallwire
    • Tech

      Spotify Developers Haven’t Written Code Since December Thanks to AI Transformation

      February 16, 2026

      Waymo Goes Fully Autonomous in Nashville, Tennessee

      February 16, 2026

      Roku Plans Streaming Bundles Push to Boost Profitability in 2026

      February 15, 2026

      Russia Officially Blocks WhatsApp After Telegram Crackdown

      February 15, 2026

      Amazon’s Eero Signal Introduces Cellular Backup for Home Internet Outages

      February 15, 2026
    • AI News

      Spotify Developers Haven’t Written Code Since December Thanks to AI Transformation

      February 16, 2026

      Australia Puts Roblox on Notice Amid Reports of Child Grooming and Harmful Content

      February 16, 2026

      UK Kids Turning to AI Chatbots and Acting on Advice at Alarming Rates

      February 16, 2026

      US Lawmakers Urge Tighter Export Controls to Curb China’s Access to Chipmaking Equipment

      February 16, 2026

      Waymo Goes Fully Autonomous in Nashville, Tennessee

      February 16, 2026
    • Security

      US Lawmakers Urge Tighter Export Controls to Curb China’s Access to Chipmaking Equipment

      February 16, 2026

      Senator Raises Questions On eSafety Crackdown And Potential Strain On US-Australia Relationship

      February 16, 2026

      AI Safety Researcher Resigns, Warns ‘World Is in Peril’ Amid Broader Industry Concerns

      February 15, 2026

      Microsoft Warns Hackers Are Exploiting Critical Zero-Day Bugs Targeting Windows, Office Users

      February 15, 2026

      Microsoft Exchange Online’s Aggressive Filters Mistake Legitimate Emails for Phishing

      February 13, 2026
    • Health

      UK Kids Turning to AI Chatbots and Acting on Advice at Alarming Rates

      February 16, 2026

      Landmark California Trial Sees YouTube Defend Itself, Rejects ‘Social Media’ and Addiction Claims

      February 16, 2026

      Instagram Top Executive Says ‘Addiction’ Doesn’t Exist in Landmark Social Media Trial

      February 15, 2026

      Amazon Pharmacy Rolls Out Same-Day Prescription Delivery To 4,500 U.S. Cities

      February 14, 2026

      AI Advances Aim to Bridge Labor Gaps in Rare Disease Treatment

      February 12, 2026
    • Science

      XAI Publicly Unveils Elon Musk’s Interplanetary AI Vision In Rare All-Hands Release

      February 14, 2026

      Elon Musk Shifts SpaceX Priority From Mars Colonization to Building a Moon City

      February 14, 2026

      NASA Artemis II Spacesuit Mobility Concerns Ahead Of Historic Mission

      February 13, 2026

      AI Agents Build Their Own MMO Playground After Moltbook Ignites Agent-Only Web Communities

      February 12, 2026

      AI Advances Aim to Bridge Labor Gaps in Rare Disease Treatment

      February 12, 2026
    • People

      Google Co-Founder’s Epstein Contacts Reignite Scrutiny of Elite Tech Circles

      February 7, 2026

      Bill Gates Denies “Absolutely Absurd” Claims in Newly Released Epstein Files

      February 6, 2026

      Informant Claims Epstein Employed Personal Hacker With Zero-Day Skills

      February 5, 2026

      Starlink Becomes Critical Internet Lifeline Amid Iran Protest Crackdown

      January 25, 2026

      Musk Pledges to Open-Source X’s Recommendation Algorithm, Promising Transparency

      January 21, 2026
    TallwireTallwire
    Home»Tech»Critical Gogs Zero-Day Under Active Exploitation Compromises 700+ Git Instances
    Tech

    Critical Gogs Zero-Day Under Active Exploitation Compromises 700+ Git Instances

    4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Critical Gogs Zero-Day Under Active Exploitation Compromises 700+ Git Instances
    Critical Gogs Zero-Day Under Active Exploitation Compromises 700+ Git Instances
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A zero-day vulnerability in Gogs, a widely used self-hosted Git service, tracked as CVE-2025-8110, is being actively exploited in the wild, enabling authenticated attackers to overwrite files outside of repositories and achieve remote code execution on vulnerable servers; more than 700 Internet-facing instances appear compromised and no official patch is yet available, prompting emergency mitigation guidance for administrators.

    Sources: Hacker News, Run Zero

    Key Takeaways

    – Active exploitation ongoing: Attackers are abusing the vulnerability in real conditions, not just in lab settings.

    – Widespread exposure: Hundreds of publicly accessible Gogs servers have been compromised, with many more potentially vulnerable.

    – No fix yet: A patch is still pending, increasing the urgency for defensive steps and configuration hardening by system owners.

    In-Depth

    A newly discovered security weakness in Gogs — the open-source, self-hosted Git hosting platform — has escalated from theoretical concern to real-world crisis within a matter of days. The vulnerability, designated CVE-2025-8110, involves improper handling of symbolic links in Gogs’ PutContents API, a component used when users push or update content in a repository. Because the flaw allows authenticated users to create or commit a symbolic link that points to an arbitrary location outside of the normal repository structure, an attacker with valid repository creation permissions can cause the server to overwrite arbitrary files on the underlying system. This file overwrite can be marshalled into a fully functional remote code execution (RCE) exploit, giving unauthorized code the same privileges as the Gogs server process. The issue appears to be a bypass of a prior fix (for CVE-2024-55947), which attempted to close a similar remote code execution hole but failed to properly address the interaction with symbolic links.

    According to independent threat researchers and security advisories, the vulnerability is not confined to theoretical proof-of-concepts — it is being actively and repeatedly exploited on internet-exposed installations. One security firm’s telemetry identified upwards of approximately 1,400 Gogs servers visible on the public internet, of which more than 700 have shown evidence of compromise. The compromise signatures include the appearance of repositories with random eight-character names, suggestive of automated tooling being used post-exploitation. Researchers first encountered the flaw while responding to a malware incident on a customer’s workload earlier in 2025, and the exploitation appears to have been ongoing for months before public disclosure.

    Compounding the severity is the absence of an official patch at the moment of reporting. Unlike many open-source projects that can rapidly issue emergency releases, the Gogs maintainers have not yet made a fixed version available, leaving operators exposed. In the interim, security advice centers around mitigation and exposure reduction: disabling open user registration (which is enabled by default in many deployments), placing the service behind a private network or VPN, and restricting public access via IP allow-listing. Administrators are also urged to scan internal networks for susceptible Gogs instances and to check logs or repository listings for indicators of compromise. Given the way the vulnerability operates, even authenticated but low-privilege users — such as those signing up for accounts on publicly facing servers — can trigger the exploit, underscoring the importance of minimizing unnecessary access and public visibility.

    From a broader security lens, this situation highlights the risks inherent in self-hosted software services that combine web APIs with file system operations — especially when symbolic link handling is involved. It also illustrates how a fix for one serious remote code execution flaw can inadvertently leave a one-day bypass if the underlying logic isn’t thoroughly re-examined. Until a patch is issued and widely deployed, defenders must assume that any Gogs instance exposed to the internet is a potential entry point for compromise and act accordingly to contain the threat vector.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCritical GeminiJack Zero-Click Vulnerability in Google Gemini Enterprise Exposed Corporate Data
    Next Article Cyberattack At Aflac Exposes Personal Information Of 22.6 Million Individuals

    Related Posts

    Spotify Developers Haven’t Written Code Since December Thanks to AI Transformation

    February 16, 2026

    Waymo Goes Fully Autonomous in Nashville, Tennessee

    February 16, 2026

    Roku Plans Streaming Bundles Push to Boost Profitability in 2026

    February 15, 2026

    Russia Officially Blocks WhatsApp After Telegram Crackdown

    February 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Spotify Developers Haven’t Written Code Since December Thanks to AI Transformation

    February 16, 2026

    Waymo Goes Fully Autonomous in Nashville, Tennessee

    February 16, 2026

    Roku Plans Streaming Bundles Push to Boost Profitability in 2026

    February 15, 2026

    Russia Officially Blocks WhatsApp After Telegram Crackdown

    February 15, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) LinkedIn Threads Instagram RSS
    • Tech
    • Entertainment
    • Business
    • Government
    • Academia
    • Transportation
    • Legal
    • Press Kit
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.