CVE-2024-56731

Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*

History

21 Aug 2025, 20:43

Type Values Removed Values Added
First Time Gogs
Gogs gogs
CPE cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*
References () https://github.com/gogs/gogs/commit/77a4a945ae9a87f77e392e9066b560edb71b5de9 - () https://github.com/gogs/gogs/commit/77a4a945ae9a87f77e392e9066b560edb71b5de9 - Patch
References () https://github.com/gogs/gogs/releases/tag/v0.13.3 - () https://github.com/gogs/gogs/releases/tag/v0.13.3 - Release Notes
References () https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7 - () https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7 - Vendor Advisory, Patch

26 Jun 2025, 18:58

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-24 04:15

Updated : 2025-08-21 20:43


NVD link : CVE-2024-56731

Mitre link : CVE-2024-56731

CVE.ORG link : CVE-2024-56731


JSON object : View

Products Affected

gogs

  • gogs
CWE
CWE-552

Files or Directories Accessible to External Parties