Gogs RCE Bypass Actively Exploited

Wiz Research discovered an actively exploited zero-day in Gogs (CVE-2025-8110) that leverages symbolic link bypass of a previous patch to overwrite files outside repositories via the PutContents API, resulting in remote code execution across hundreds of internet-exposed instances. The campaign deployed a Supershell-based Go payload (UPX-packed and garbled) and used open-registration to create repositories with random 8-character names; a patch is not yet available. #CVE-2025-8110 #Supershell

Keypoints

  • Wiz observed a live zero-day (CVE-2025-8110) in Gogs that bypasses a prior fix (CVE-2024-55947) by abusing symbolic links to write outside repository boundaries and achieve RCE.
  • Over ~1,400 Gogs instances were exposed to the internet in Wiz’s scan, with 700+ showing indicators of compromise—over 50% of exposed instances.
  • Exploitation is trivial for authenticated users with repository creation permissions (open registration is a default), enabling attackers to commit a symlink and use the PutContents API to overwrite target files.
  • Attackers overwrite .git/config (sshCommand) to force arbitrary command execution, enabling full remote control of affected hosts.
  • The payload used Supershell C2, was written in Go, UPX-packed and obfuscated with the garble tool, complicating static analysis and detection.
  • Wiz responsibly disclosed the issue to Gogs maintainers (reported July 17, 2025); as of the reported timeline the vulnerability remains unpatched and exploitation continued through December 2025.

MITRE Techniques

  • [T1190 ] Exploit Public-Facing Application – The attacker abused the Gogs PutContents API to write through a symlink and overwrite files outside the repository, enabling RCE. (‘…Using the PutContents API, they write data to the symlink. The system follows the link and overwrites the target file outside the repository.’)
  • [T1078 ] Valid Accounts – Exploitation relies on repository creation permissions available by default (open registration), allowing attackers to create repos and commit symlinks. (‘…The exploitation process is trivial for any user with repository creation permissions (enabled by default): The attacker creates a standard git repository.’)
  • [T1543 ] Create or Modify System Process – The attacker overwrote .git/config (specifically sshCommand) to force execution of arbitrary commands on the host. (‘…By overwriting .git/config (specifically the sshCommand), the attacker can force the system to execute arbitrary commands.’)
  • [T1027 ] Obfuscated Files or Information – The malware payload used multiple obfuscation layers (UPX packing and garbling) with encrypted string literals to hinder static analysis. (‘…The payload had multiple layers of obfuscation designed to evade detection: The first a simple UPX packing…compiled with the garble tool…most string literals are encrypted on disk and only decrypted during run time…’)
  • [T1071.001 ] Application Layer Protocol: Web Protocols – Supershell established a reverse SSH shell that communicates over web services, providing command-and-control over standard web channels. (‘…Supershell is an open-source Command and Control (C2) platform whose primary function is to establish a reverse SSH shell that communicates over web services.’)

Indicators of Compromise

  • [SHA-1 ] Malware file hashes – d8fcd57a71f9f6e55b063939dc7c1523660b7383, efda81e1100ea977321d0f2eeb0dfa7a6b132abd (identified as Supershell-related payloads).
  • [IPv4 ] C2 and payload infrastructure – 119.45.176[.]196 (Supershell C2), 106.53.108[.]81 (payload server), and 119.91.42[.]53 (another payload server).
  • [File name ] Targeted/overwritten configuration – .git/config (sshCommand overwritten to enable remote command execution).
  • [Repository pattern ] Artifacts of exploitation – random 8-character owner/repo names (created around July 10), indicating automated “smash-and-grab” activity (e.g., a1b2c3d4 as representative pattern).
  • [Software version ] Vulnerable software indicators – Gogs instances running version <= 0.13.3 with open registration enabled are vulnerable to CVE-2025-8110.


Read more: https://www.wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit