Impact
Prior to version 0.14.2, Gogs permits authenticated users to insert arbitrary JavaScript in issue comments or issue descriptions via data: URI links, creating a stored cross‑site scripting flaw (CWE‑79: Improper Neutralization of Input During Web Page Generation) that permits client‑side script execution. Based on this, it is inferred that an attacker could potentially compromise data confidentiality, hijack sessions, or carry out similar client‑side attacks.
Affected Systems
Self‑hosted Gogs installations running any version older than 0.14.2 are vulnerable; the issue is limited to users who can edit or create issue comments and descriptions.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.7, indicating high severity. The EPSS score is below 1%, suggesting low current exploitation likelihood, and it is not yet listed in the CISA KEV catalog. Attack requires authentication and the ability to post or edit issue comments, so it is primarily an insider or compromised‑user threat rather than a remote unauthenticated vector.
OpenCVE Enrichment
Github GHSA