The US government has asked Gog to fix a serious security issue or face attack


  • CISA added Gog’s CVE-2025-8110 to its catalog of known exploited vulnerabilities
  • Critical symlink bypass allows unauthorized remote code execution via the PutContents API
  • Over 700 Gogs Servers Compromised; agencies must patch by February 2, 2026

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a new bug to its Known Exploited Vulnerabilities (KEV) catalog, not only signaling that it is being actively exploited in the wild, but also ordering Federal Civilian Executive Branch (FCEB) agencies to patch it or stop using the vulnerable software altogether.

The software at risk is Gogs, a self-hosted Git service that lets organizations run their own private alternatives to Github or GitLab.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top