Remote Code Execution in Gogs
        
  High severity
        
          GitHub Reviewed
      
        Published
          Nov 15, 2024 
          to the GitHub Advisory Database
          •
          Updated Oct 8, 2025 
      
  
Description
        Published by the National Vulnerability Database
      Nov 15, 2024 
    
  
        Published to the GitHub Advisory Database
      Nov 15, 2024 
    
  
        Reviewed
      Nov 15, 2024 
    
  
        Last updated
      Oct 8, 2025 
    
  
Gogs <0.13.2 is vulnerable to symbolic link path traversal that enables remote code execution via the editFilePost function of internal/route/repo/editor.go.
References