Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsCISA Orders Feds to Patch Gogs RCE Flaw Exploited in Zero-Day Attacks
CISA Orders Feds to Patch Gogs RCE Flaw Exploited in Zero-Day Attacks
Cybersecurity

CISA Orders Feds to Patch Gogs RCE Flaw Exploited in Zero-Day Attacks

•January 12, 2026
0
BleepingComputer
BleepingComputer•Jan 12, 2026

Companies Mentioned

GitHub

GitHub

GitLab

GitLab

GTLB

Shodan

Shodan

Why It Matters

Exploiting this RCE can give attackers command execution on federal systems, threatening sensitive data and operational continuity. Prompt remediation reduces the attack surface across the government’s extensive software supply chain.

Key Takeaways

  • •Gogs CVE‑2025‑8110 enables RCE via symlink path traversal.
  • •Over 1,400 Gogs servers found, 700 compromised.
  • •CISA mandates federal patching by Feb 2 2026.
  • •Patch adds symlink‑aware validation to PutContents API.
  • •Disable open registration and restrict access to mitigate risk.

Pulse Analysis

Gogs, an open‑source Git service written in Go, has gained popularity as a lightweight alternative to GitLab and GitHub Enterprise, especially for internal collaboration and self‑hosted deployments. Because it is often exposed to the internet for remote development, any security flaw can quickly become a vector for large‑scale exploitation. The newly disclosed CVE‑2025‑8110 exemplifies this risk: a path‑traversal bug in the PutContents API lets an authenticated user write arbitrary files outside the repository, effectively bypassing earlier safeguards. In a landscape where software supply‑chain attacks are on the rise, such vulnerabilities attract heightened scrutiny from both researchers and regulators.

Wiz Research first identified the flaw while tracing a malware infection on a public Gogs instance in July, and the vendor released a patch only after a three‑month delay. In the interim, threat actors launched a coordinated zero‑day campaign on November 1, leveraging symbolic links to overwrite critical Git configuration files such as sshCommand, which can trigger arbitrary command execution. Investigations revealed more than 1,400 internet‑exposed Gogs servers, with over 700 showing evidence of compromise, underscoring the rapid spread of the exploit across diverse sectors.

CISA’s directive compels all Federal Civilian Executive Branch agencies to install the patch by February 2 2026, aligning with the agency’s broader effort to harden cloud‑based development tools under BOD 22‑01. Administrators are also urged to disable the default open‑registration setting, enforce VPN or IP allow‑list controls, and monitor the PutContents API for anomalous activity. While the immediate focus is on federal infrastructure, the advisory serves as a cautionary signal for private enterprises that rely on Gogs or similar self‑hosted Git platforms: timely patching and strict access controls are essential to prevent similar RCE incidents.

CISA orders feds to patch Gogs RCE flaw exploited in zero-day attacks

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...