Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x9p5-w45c-7ffc | Gogs: Access tokens get exposed through URL params in API requests |
Fri, 06 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gogs
Gogs gogs |
|
| CPEs | cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gogs
Gogs gogs |
|
| Metrics |
cvssV3_1
|
Thu, 05 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gogs is an open source self-hosted Git service. Prior to version 0.14.2, gogs api still accepts tokens in url params like token and access_token, which can leak through logs, browser history, and referrers. This issue has been patched in version 0.14.2. | |
| Title | Gogs: Access tokens get exposed through URL params in API requests | |
| Weaknesses | CWE-598 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T18:08:07.473Z
Reserved: 2026-02-11T19:56:24.813Z
Link: CVE-2026-26196
Updated: 2026-03-06T18:08:01.799Z
Status : Analyzed
Published: 2026-03-05T19:16:04.080
Modified: 2026-03-05T22:04:11.257
Link: CVE-2026-26196
No data.
OpenCVE Enrichment
Updated: 2026-04-16T12:15:35Z
Github GHSA