Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6192 | Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious characters. |
Github GHSA |
GHSA-xq4v-vrp9-vcf2 | Cross-site Scripting vulnerability in repository issue list in Gogs |
Wed, 23 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T18:18:26.561Z
Reserved: 2022-05-18T00:00:00.000Z
Link: CVE-2022-31038
Updated: 2024-08-03T07:03:40.294Z
Status : Modified
Published: 2022-06-09T17:15:09.917
Modified: 2024-11-21T07:03:45.870
Link: CVE-2022-31038
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA