Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44625: n/a

0
High
VulnerabilityCVE-2024-44625cvecve-2024-44625
Published: Fri Nov 15 2024 (11/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:42:05 UTC

Technical Analysis

CVE-2024-44625 is a directory traversal vulnerability identified in Gogs, an open-source self-hosted Git service, affecting versions up to 0.13.0. The flaw exists in the editFilePost function located in internal/route/repo/editor.go, where insufficient validation of file path inputs allows an authenticated user with limited privileges to traverse directories outside the intended repository scope. This vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and enables attackers to read or modify arbitrary files on the server hosting Gogs. The CVSS 3.1 base score of 8.8 reflects a high severity, with attack vector being network-based (AV:N), requiring low attack complexity (AC:L), and privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability poses a significant risk because it can lead to unauthorized disclosure or alteration of sensitive source code and configuration files, potentially enabling further compromise of the development environment or the underlying system. The lack of available patches at the time of publication necessitates immediate attention from administrators to implement compensating controls.

Potential Impact

The exploitation of CVE-2024-44625 could have severe consequences for organizations relying on Gogs for source code management. Unauthorized directory traversal can lead to exposure of sensitive information such as source code, credentials, or configuration files, undermining confidentiality. Attackers could also modify critical files, impacting the integrity of repositories and potentially injecting malicious code or backdoors. Availability could be affected if attackers overwrite or delete essential files, disrupting development workflows and continuous integration pipelines. This vulnerability can facilitate lateral movement within the network if attackers leverage stolen credentials or code to escalate privileges. Given Gogs' use in software development, compromised repositories could propagate vulnerabilities into production systems, amplifying the risk. Organizations with limited monitoring or weak access controls are particularly vulnerable to stealthy exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation.

Mitigation Recommendations

To mitigate CVE-2024-44625, organizations should first verify if they are running Gogs versions up to 0.13.0 and plan immediate upgrades once a patched version is released. In the absence of an official patch, administrators should restrict repository editing permissions strictly to trusted users and enforce the principle of least privilege. Implement network-level access controls to limit exposure of the Gogs instance to internal or trusted networks only. Enable detailed logging and monitoring of file access and modification events within Gogs to detect suspicious activity early. Conduct regular audits of repository contents and server file systems to identify unauthorized changes. Consider deploying web application firewalls (WAFs) with custom rules to detect and block directory traversal attempts targeting the editFilePost endpoint. Additionally, isolate the Gogs server in a hardened environment with minimal privileges and ensure underlying operating system security best practices are followed to reduce the impact of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ce0b7ef31ef0b569c22

Added to database: 2/25/2026, 9:42:56 PM

Last enriched: 2/28/2026, 6:42:05 AM

Last updated: 4/12/2026, 6:12:38 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses