Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20888: CWE-284: Improper Access Control in Gitea Gitea Open Source Git Server

0
Medium
VulnerabilityCVE-2026-20888cvecve-2026-20888cwe-284cwe-862
Published: Thu Jan 22 2026 (01/22/2026, 22:01:51 UTC)
Source: CVE Database V5
Vendor/Project: Gitea
Product: Gitea Open Source Git Server

Description

CVE-2026-20888 is a medium severity vulnerability in the Gitea Open Source Git Server where improper access control allows users with read access to pull requests to cancel scheduled auto-merges initiated by other users. This flaw arises from insufficient authorization checks in the web interface when handling auto-merge cancellations. Exploitation does not require user interaction but does require at least read-level privileges. The vulnerability impacts the integrity of the development workflow by enabling unauthorized interference with merge operations, though it does not affect confidentiality or availability. No known exploits are currently reported in the wild. European organizations using Gitea for source code management should review their access control policies and update or patch affected versions once fixes are available.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:56:37 UTC

Technical Analysis

CVE-2026-20888 is an access control vulnerability identified in the Gitea Open Source Git Server, specifically concerning the cancellation of scheduled auto-merges via the web interface. The root cause is improper authorization verification, which allows users who have only read access to pull requests to cancel auto-merges scheduled by other users. This violates the principle of least privilege and undermines the integrity of the software development lifecycle. The vulnerability is categorized under CWE-284 (Improper Access Control) and CWE-862 (Missing Authorization). The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low privileges, and no user interaction is needed. The impact is limited to a confidentiality loss (minimal) with no direct impact on integrity or availability, as the attacker cannot modify code or disrupt service but can interfere with merge operations. No patches or exploits are currently documented, but the issue requires attention to prevent workflow disruption and potential trust issues in code integration processes.

Potential Impact

For European organizations, this vulnerability could disrupt software development workflows by allowing unauthorized users to cancel auto-merges, potentially delaying feature integration and bug fixes. While it does not directly compromise source code confidentiality or availability, the integrity of the development process is at risk, which could lead to operational inefficiencies and increased risk of human error or malicious interference. Organizations relying heavily on Gitea for collaborative development, especially those with complex CI/CD pipelines, may face challenges in maintaining codebase stability. This could be particularly impactful for sectors with stringent software quality requirements such as finance, healthcare, and critical infrastructure. The vulnerability may also erode trust among development teams if unauthorized actions go undetected.

Mitigation Recommendations

Organizations should immediately audit user permissions within Gitea, ensuring that read access users do not have unintended capabilities to affect merge operations. Implement strict role-based access control (RBAC) policies that clearly separate read-only users from those authorized to manage merges. Monitor and log all auto-merge scheduling and cancellation activities to detect unauthorized attempts. Until an official patch is released, consider restricting auto-merge features to trusted users only or disabling auto-merge scheduling if feasible. Additionally, integrate code review and merge approval processes outside of Gitea’s auto-merge functionality to maintain control over code integration. Stay informed on updates from the Gitea project and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Gitea
Date Reserved
2026-01-08T23:02:37.542Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6972a2c84623b1157c93282d

Added to database: 1/22/2026, 10:20:56 PM

Last enriched: 1/30/2026, 9:56:37 AM

Last updated: 2/7/2026, 9:26:52 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats