Cyber Posture

CVE-2025-64111

CriticalPublic PoCRCE

Published: 06 February 2026

Published
06 February 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0023 45.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-64111 is a critical-severity OS Command Injection (CWE-78) vulnerability in Gogs Gogs. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 45.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring timely patching of the insufficient fix for .git directory file updates leading to remote command execution.

prevent

Prevents OS command injection (CWE-78) by validating and sanitizing inputs used to update files in the .git directory.

detect

Enables identification of the specific Gogs vulnerability through vulnerability scanning, facilitating remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote command execution via OS command injection in a public-facing self-hosted Git service (Gogs), directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, due to the insufficient patch for CVE-2024-56731, it's still possible to update files in the .git directory and achieve remote command execution. This issue has been patched…

more

in versions 0.13.4 and 0.14.0+dev.

Deeper analysisAI

CVE-2025-64111 is a critical vulnerability in Gogs, an open source self-hosted Git service, affecting versions 0.13.3 and prior. It stems from an insufficient patch for the prior CVE-2024-56731, which still allows attackers to update files in the .git directory and achieve remote command execution. Classified under CWE-78 (OS Command Injection), the flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Successful exploitation enables full remote command execution on the Gogs server, compromising confidentiality, integrity, and availability with high impact.

The issue has been patched in Gogs versions 0.13.4 and 0.14.0+dev. Security practitioners are advised to upgrade to these versions immediately. Additional details are available in the GitHub Security Advisory at https://github.com/gogs/gogs/security/advisories/GHSA-gg64-xxr9-qhjp.

Details

CWE(s)

Affected Products

gogs
gogs
≤ 0.13.4

CVEs Like This One

CVE-2025-64175Same product: Gogs Gogs
CVE-2026-26194Same product: Gogs Gogs
CVE-2025-8110Same product: Gogs Gogs
CVE-2026-25921Same product: Gogs Gogs
CVE-2026-25232Same product: Gogs Gogs
CVE-2026-26276Same product: Gogs Gogs
CVE-2026-25242Same product: Gogs Gogs
CVE-2026-24135Same product: Gogs Gogs
CVE-2026-26022Same product: Gogs Gogs
CVE-2026-23702Shared CWE-78

References