Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jp7c-wj6q-3qf2 | Gogs vulnerable to arbitrary file deletion via Path Traversal in wiki page update |
Tue, 17 Feb 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gogs
Gogs gogs |
|
| Vendors & Products |
Gogs
Gogs gogs |
Fri, 06 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, a path traversal vulnerability exists in the updateWikiPage function of Gogs. The vulnerability allows an authenticated user with write access to a repository's wiki to delete arbitrary files on the server by manipulating the old_title parameter in the wiki editing form. This issue has been patched in versions 0.13.4 and 0.14.0+dev. | |
| Title | Gogs vulnerable to arbitrary file deletion via path traversal in wiki page update | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-06T18:08:28.398Z
Reserved: 2026-01-21T18:38:22.474Z
Link: CVE-2026-24135
Updated: 2026-02-06T18:08:11.546Z
Status : Analyzed
Published: 2026-02-06T18:15:57.483
Modified: 2026-02-17T21:55:35.007
Link: CVE-2026-24135
No data.
OpenCVE Enrichment
Updated: 2026-04-17T22:45:29Z
Github GHSA