Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20904: CWE-284: Improper Access Control in Gitea Gitea Open Source Git Server

0
Medium
VulnerabilityCVE-2026-20904cvecve-2026-20904cwe-284cwe-639
Published: Thu Jan 22 2026 (01/22/2026, 22:01:51 UTC)
Source: CVE Database V5
Vendor/Project: Gitea
Product: Gitea Open Source Git Server

Description

CVE-2026-20904 is a medium severity vulnerability in the Gitea open source Git server where authenticated users can improperly toggle the visibility of other users' OpenID URIs due to insufficient ownership validation. This improper access control flaw allows attackers to alter identity visibility settings without authorization, potentially impacting user privacy and trust. The vulnerability requires authentication but no user interaction beyond that, and does not affect confidentiality directly but impacts integrity of user settings. There are no known exploits in the wild yet. European organizations using Gitea for source code management should assess their exposure and apply mitigations promptly. The vulnerability is particularly relevant for countries with strong open source adoption and active software development communities. Mitigation involves restricting access controls, auditing user permissions, and monitoring changes to OpenID visibility settings. No official patch links are currently available, so organizations should follow Gitea updates closely. Overall, this vulnerability highlights the importance of strict access control enforcement in collaborative development platforms.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:57:09 UTC

Technical Analysis

CVE-2026-20904 is an improper access control vulnerability identified in the Gitea open source Git server, specifically related to the management of OpenID URI visibility settings. The issue arises because Gitea does not properly validate ownership when an authenticated user attempts to toggle the visibility of OpenID identities. This means that a user with valid credentials can change the visibility settings of other users' OpenID URIs, which should normally be restricted to the respective owners. The vulnerability is classified under CWE-284 (Improper Access Control) and CWE-639 (Authorization Bypass Through User-Controlled Key). The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N. This means the attack can be performed remotely over the network with low attack complexity, requires privileges (authenticated user), no user interaction, and impacts integrity but not confidentiality or availability. The affected versions are not explicitly detailed beyond a placeholder '0', suggesting all current versions at the time of disclosure may be vulnerable. No known exploits have been reported in the wild, and no official patches or fixes have been linked yet. The vulnerability could allow malicious insiders or compromised accounts to manipulate OpenID visibility settings, potentially leading to privacy violations or trust issues within the development environment. Since Gitea is widely used for source code hosting and collaboration, improper access control can undermine the security posture of affected organizations.

Potential Impact

For European organizations, the impact of CVE-2026-20904 primarily concerns the integrity of user identity management within Gitea instances. Unauthorized modification of OpenID visibility settings could lead to privacy breaches, as users' authentication identities might be exposed or hidden improperly, affecting trust in the system. While this vulnerability does not directly compromise source code confidentiality or availability, it could facilitate further social engineering or insider threats by manipulating identity information. Organizations relying on Gitea for critical development workflows may face reputational damage if user identity settings are tampered with. Additionally, this vulnerability could be exploited by malicious insiders or attackers who have gained authenticated access to escalate their control over user identity attributes. Given the collaborative nature of software development in Europe, especially in countries with strong open source ecosystems, this vulnerability could disrupt normal operations and complicate compliance with data protection regulations such as GDPR if identity information is mishandled.

Mitigation Recommendations

To mitigate CVE-2026-20904, European organizations should implement the following specific measures: 1) Immediately audit current Gitea instances to identify any unauthorized changes to OpenID visibility settings and review user permissions related to identity management. 2) Restrict access to the OpenID visibility toggling functionality to only trusted administrators or the respective identity owners by enforcing stricter access control policies within Gitea. 3) Monitor logs for unusual activity related to OpenID URI visibility changes to detect potential exploitation attempts early. 4) If possible, disable OpenID integration temporarily until a patch or official fix is released by the Gitea project. 5) Engage with the Gitea community or maintainers to track the release of patches or updates addressing this vulnerability and apply them promptly. 6) Educate users and administrators about the risks of improper access control and encourage strong authentication and account security practices to reduce the risk of compromised credentials. 7) Consider implementing additional network segmentation or multi-factor authentication to limit the impact of compromised accounts. These steps go beyond generic advice by focusing on identity-specific controls and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Gitea
Date Reserved
2026-01-08T23:02:37.537Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6972a2c84623b1157c93283b

Added to database: 1/22/2026, 10:20:56 PM

Last enriched: 1/30/2026, 9:57:09 AM

Last updated: 2/7/2026, 2:29:09 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats