icon

We found results for “

CVE-2024-56731

Good to know:

icon

Date: June 23, 2025

Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.

Severity Score

Severity Score

Weakness Type (CWE)

Files or Directories Accessible to External Parties

CWE-552

Top Fix

icon

Upgrade Version

Upgrade to version github.com/gogs/gogs - v0.13.3;gogs.io/gogs - v0.13.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us