Description
Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue has been patched in version 0.14.2.
Published: 2026-03-05
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: LFS Object Overwrite allows malicious code to be injected across repositories, compromising code integrity.
Action: Immediate Patch
AI Analysis

Impact

Gogs instances prior to version 0.14.2 allow an attacker to overwrite any LFS object in any repository without content hash verification. This vulnerability can be leveraged to replace legitimate large file objects with attacker‑controlled binaries or scripts, effectively injecting malicious code into software artifacts. The flaw is a severe code injection vector that undermines confidentiality and integrity of codebases, granting disruptors control over potentially critical assets.

Affected Systems

The affected product is the Gogs self‑hosted Git service, specifically all versions earlier than 0.14.2. Users running any earlier build of Gogs on their own servers are vulnerable. Patches have been released in release 0.14.2 and later. There is no indication that specific operating systems or configuration modes modify the risk, so the entire Gogs customer base prior to the patch is at risk.

Risk and Exploitability

The CVSS score of 9.3 indicates a critical severity. EPSS indicates the likelihood of exploitation is very low (<1%), and the vulnerability is not currently catalogued in CISA’s KEV list. The attack vector is inferred to be remote, using the standard LFS upload endpoints exposed by the service. An attacker needs write access to a repository or the ability to submit LFS objects to the server, which is often the case for collaborators or public projects. If such access is available, the attacker can trigger the overwrite by uploading a malicious LFS file with a matching key used by other repositories.

Generated by OpenCVE AI on April 16, 2026 at 12:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official Gogs update to version 0.14.2 or later, which restores content hash verification for LFS uploads.
  • Immediately revoke or replace any LFS objects in repositories that could have been overwritten, and rebuild affected artifacts from trusted sources.
  • Audit repository histories for inadvertent LFS changes and restore from backups or source control if contamination is detected.

Generated by OpenCVE AI on April 16, 2026 at 12:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cj4v-437j-jq4c Gogs: Cross-repository LFS object overwrite via missing content hash verification
History

Fri, 06 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Gogs
Gogs gogs
CPEs cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
Vendors & Products Gogs
Gogs gogs

Thu, 05 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue has been patched in version 0.14.2.
Title Gogs: Cross-repository LFS object overwrite via missing content hash verification
Weaknesses CWE-345
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T18:10:49.926Z

Reserved: 2026-02-09T16:22:17.785Z

Link: CVE-2026-25921

cve-icon Vulnrichment

Updated: 2026-03-06T18:10:45.647Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T19:16:03.183

Modified: 2026-03-06T14:02:02.117

Link: CVE-2026-25921

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:15:35Z

Weaknesses