CVE-2025-64111
Published: 06 February 2026
Summary
CVE-2025-64111 is a critical-severity OS Command Injection (CWE-78) vulnerability in Gogs Gogs. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 45.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the CVE by requiring timely patching of the insufficient fix for .git directory file updates leading to remote command execution.
Prevents OS command injection (CWE-78) by validating and sanitizing inputs used to update files in the .git directory.
Enables identification of the specific Gogs vulnerability through vulnerability scanning, facilitating remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows unauthenticated remote command execution via OS command injection in a public-facing self-hosted Git service (Gogs), directly mapping to exploitation of public-facing applications.
NVD Description
Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, due to the insufficient patch for CVE-2024-56731, it's still possible to update files in the .git directory and achieve remote command execution. This issue has been patched…
more
in versions 0.13.4 and 0.14.0+dev.
Deeper analysisAI
CVE-2025-64111 is a critical vulnerability in Gogs, an open source self-hosted Git service, affecting versions 0.13.3 and prior. It stems from an insufficient patch for the prior CVE-2024-56731, which still allows attackers to update files in the .git directory and achieve remote command execution. Classified under CWE-78 (OS Command Injection), the flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Successful exploitation enables full remote command execution on the Gogs server, compromising confidentiality, integrity, and availability with high impact.
The issue has been patched in Gogs versions 0.13.4 and 0.14.0+dev. Security practitioners are advised to upgrade to these versions immediately. Additional details are available in the GitHub Security Advisory at https://github.com/gogs/gogs/security/advisories/GHSA-gg64-xxr9-qhjp.
Details
- CWE(s)