The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a high-severity Gogs vulnerability (CVE-2025-8110) that is being exploited in active zero-day attacks. This flaw allows attackers to overwrite sensitive system files and execute arbitrary commands, putting numerous Gogs servers and federal systems at risk. #CISA #GogsVulnerability
Keypoints
- The vulnerability CVE-2025-8110 affects Gogs, a self-hosted Git service written in Go.
- Threat actors are exploiting this flaw through symbolic link abuse to overwrite files outside repositories.
- Over 1,400 Gogs servers are exposed online, with over 700 showing signs of compromise.
- CISA has mandated federal agencies to patch the vulnerability by February 2, 2026.
- Mitigation includes disabling open registration and restricting access via VPN or allow lists.