Description
Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have a broken access control vulnerability which allows authenticated users with write access to any repository to modify labels belonging to other repositories. The UpdateLabel function in the Web UI (internal/route/repo/issue.go) fails to verify that the label being modified belongs to the repository specified in the URL path, enabling cross-repository label tampering attacks. The vulnerability exists in the Web UI's label update endpoint POST /:username/:reponame/labels/edit. The handler function UpdateLabel uses an incorrect database query function that bypasses repository ownership validation. This issue has been fixed in version 0.14.1.
INFO
Published Date :
2026-02-19T02:33:09.877Z
Last Modified :
2026-02-19T17:44:28.915Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-25229 vulnerability.
| Vendors | Products |
|---|---|
| Gogs |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25229.