Cyber Posture

CVE-2026-24135

High

Published: 06 February 2026

Published
06 February 2026
Modified
17 February 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0006 19.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24135 is a high-severity Path Traversal (CWE-22) vulnerability in Gogs Gogs. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique File Deletion (T1070.004); ranked at the 19.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to File Deletion (T1070.004) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the path traversal vulnerability by validating the old_title parameter to prevent traversal sequences from accessing arbitrary files.

prevent

Requires timely remediation of the specific flaw in Gogs' updateWikiPage function through patching to versions 0.13.4 or later.

prevent

Enforces logical access controls to restrict authenticated wiki write users from performing unauthorized file deletions outside intended directories.

MITRE ATT&CK Enterprise TechniquesAI

T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
Why these techniques?

Path traversal enables arbitrary file deletion outside intended wiki directories, directly facilitating file deletion (T1070.004) and data destruction (T1485) by an authenticated user.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, a path traversal vulnerability exists in the updateWikiPage function of Gogs. The vulnerability allows an authenticated user with write access to a repository's wiki to delete arbitrary…

more

files on the server by manipulating the old_title parameter in the wiki editing form. This issue has been patched in versions 0.13.4 and 0.14.0+dev.

Deeper analysisAI

CVE-2026-24135 is a path traversal vulnerability (CWE-22) in the updateWikiPage function of Gogs, an open-source self-hosted Git service. It affects version 0.13.3 and prior. The flaw enables manipulation of the old_title parameter in the wiki editing form, allowing unauthorized file access and deletion outside the intended directory.

An authenticated user with write access to a repository's wiki can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation grants the ability to delete arbitrary files on the server, resulting in high integrity and availability impacts (CVSS 8.1: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), while confidentiality remains unaffected.

The Gogs security advisory at https://github.com/gogs/gogs/security/advisories/GHSA-jp7c-wj6q-3qf2 confirms the issue and states it has been patched in versions 0.13.4 and 0.14.0+dev. Security practitioners should upgrade to a patched version immediately to mitigate the risk.

Details

CWE(s)

Affected Products

gogs
gogs
≤ 0.13.4

CVEs Like This One

CVE-2025-8110Same product: Gogs Gogs
CVE-2026-26022Same product: Gogs Gogs
CVE-2026-26276Same product: Gogs Gogs
CVE-2026-25242Same product: Gogs Gogs
CVE-2025-64111Same product: Gogs Gogs
CVE-2026-25232Same product: Gogs Gogs
CVE-2026-26194Same product: Gogs Gogs
CVE-2025-64175Same product: Gogs Gogs
CVE-2026-25921Same product: Gogs Gogs
CVE-2025-13377Shared CWE-22

References