Description
Gitea does not properly verify authorization when canceling scheduled auto-merges via the web interface. A user with read access to pull requests may be able to cancel auto-merges scheduled by other users.
Published: 2026-01-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass (Read-Only Users Can Cancel Scheduled Auto‑Merge)
Action: Patch Immediately
AI Analysis

Impact

Gitea does not correctly enforce authorization checks when a user accesses the web interface endpoint used to cancel scheduled auto‑merges. As a result, any account that has read access to pull requests can invoke this endpoint and cancel auto‑merge jobs that were scheduled by other users. This flaw allows a low‑privileged user to interfere with the repository’s merge workflow, potentially delaying or preventing the integration of code changes. The vulnerability is an example of improper authorization (CWE‑284) and authorization bypass (CWE‑862).

Affected Systems

Vendors affected include the Gitea open source Git server. The CVE does not specify which releases are vulnerable, but the advisory references the 1.25.4 release where the issue was addressed. Consequently, any installation of Gitea that predates that patch, or that has not been updated to a fixed version, is susceptible.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation at the time of analysis. The flaw is not listed in the CISA KEV catalog, so no known active exploitation is documented. The attack can be performed over the web from any browser session that has PR read rights, without requiring elevated permissions or additional authentication steps beyond normal access to pull requests. Because the vulnerability is limited to account permissions rather than system‑wide compromise, the potential impact is confined to the ability to cancel merges, though this could disrupt automated pipelines and delay code delivery.

Generated by OpenCVE AI on April 18, 2026 at 03:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Gitea version 1.25.4 or later to receive the fixed authorization check for the cancel‑auto‑merge endpoint.
  • If an upgrade cannot be performed immediately, disable the auto‑merge feature or restrict the cancel‑auto‑merge endpoint to users with at least write access to the repository.
  • Monitor repository logs for unexpected cancellation events and review user permissions to ensure read‑only users do not possess broader privileges than necessary.

Generated by OpenCVE AI on April 18, 2026 at 03:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9cgq-wp42-4rpq Gitea does not properly verify authorization when canceling scheduled auto-merges via the web interface
History

Thu, 29 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gitea:gitea:*:*:*:*:*:-:*:*

Tue, 27 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 23 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Gitea
Gitea gitea
Vendors & Products Gitea
Gitea gitea

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Gitea does not properly verify authorization when canceling scheduled auto-merges via the web interface. A user with read access to pull requests may be able to cancel auto-merges scheduled by other users.
Title Gitea Pull Requests Auto-Merge: Read-Only Users Can Cancel Scheduled Auto-Merge via Web Endpoint (Authorization Bypass)
Weaknesses CWE-284
CWE-862
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Gitea

Published:

Updated: 2026-01-23T21:54:14.856Z

Reserved: 2026-01-08T23:02:37.542Z

Link: CVE-2026-20888

cve-icon Vulnrichment

Updated: 2026-01-23T21:09:48.392Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T22:16:17.890

Modified: 2026-01-29T22:00:58.803

Link: CVE-2026-20888

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-22T22:01:51Z

Links: CVE-2026-20888 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:45:21Z

Weaknesses