CVE-2026-20750
Published: 22 January 2026
Summary
CVE-2026-20750 is a critical-severity Improper Access Control (CWE-284) vulnerability in Gitea Gitea. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces approved authorizations for access to resources, addressing Gitea's failure to validate project ownership across organizations.
Requires timely remediation of flaws like this improper access control vulnerability via patches such as Gitea v1.25.4.
Enforces least privilege to restrict project write access within the user's organization only, mitigating cross-organization modifications.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote exploitation of improper access control in public-facing Gitea server (T1190) to perform unauthorized cross-organization modifications, directly facilitating privilege escalation (T1068).
NVD Description
Gitea does not properly validate project ownership in organization project operations. A user with project write access in one organization may be able to modify projects belonging to a different organization.
Deeper analysisAI
CVE-2026-20750 is a critical vulnerability in Gitea, an open-source self-hosted Git service, stemming from improper validation of project ownership during organization project operations. Published on 2026-01-22, it has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) and maps to CWE-284 (Improper Access Control). The flaw enables a user with project write access in one organization to modify projects belonging to a different organization.
An authenticated attacker possessing write access to a project within one organization can remotely exploit this vulnerability with low complexity and no user interaction. Successful exploitation allows modification of projects in unrelated organizations, resulting in high impacts to confidentiality and integrity, such as unauthorized data alteration or exposure.
Gitea mitigated this issue in release v1.25.4, as announced in their blog post and detailed in the GitHub security advisory GHSA-h4fh-pc4w-8w27. Patches are provided via pull requests #36318 and #36373, with full release notes available on the v1.25.4 tag page. Security practitioners should update affected Gitea instances promptly to prevent exploitation.
Details
- CWE(s)