Impact
A flaw in the Gogs source-code Git service allows a user with authentication to terminate the application by deleting a repository file before the system synchronizes it. The bug triggers an internal crash, disrupting the availability of the service for all users. The weakness is categorized as a missing authorization flaw (CWE‑862).
Affected Systems
The vulnerability affects the Gogs self-hosted Git service for all installations running version 0.13.3 or earlier. The issue has been fixed in 0.13.4 and in subsequent development builds 0.14.0+.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. The EPSS value of less than 1% suggests a low probability of exploitation. Because the attack requires an authenticated user with write access to a repository, the threat surface is limited primarily to insiders or compromised accounts, and it is not currently listed in the CISA KEV catalog.
OpenCVE Enrichment
Github GHSA