Impact
Gogs versions 0.13.4 and older contain a flaw in the DeleteBranchPost handler that allows any repository collaborator with write access to delete protected branches, including the default branch, by sending a direct POST request. The vulnerability bypasses the branch protection mechanism, elevating a write‑level user to administrator level functionality. The exploitation does not involve external code injection or arbitrary code execution; instead it permits unauthorized modification of repository history and deletion of critical branches.
Affected Systems
The vulnerability affects Gogs repositories hosted on the open source Gogs platform. All instances running version 0.13.4 or earlier are susceptible. The fix is available in the 0.14.1 release. Administrators must check their Gogs installation version and update if it falls within the vulnerable range.
Risk and Exploitability
The CVSS base score is 7.1, indicating a high severity vulnerability. The EPSS score is reported as less than 1%, meaning the probability of exploitation is very low but not zero. The vulnerability is not listed in the CISA KEV catalog, suggesting no documented active exploits. An attacker must own write access to a repository that has protected branches and must be able to access the Gogs web interface. When these conditions are met, an exploit can be executed with a single POST request, providing the attacker with privileged abilities normally reserved for administrators.
OpenCVE Enrichment
Github GHSA