GHSA-fc3h-92p8-h36f: Unauthenticated File Upload in Gogs
mediumvulnerability
security
Summary
Gogs, a self-hosted Git service, has a vulnerability where anyone can upload files without logging in if the RequireSigninView setting is disabled (which is the default). Attackers can upload arbitrary files to the server by obtaining a CSRF token (a security token to prevent cross-site request forgery) from the homepage and using it with the /issues/attachments or /releases/attachments endpoints, potentially filling up disk space, hosting malware, or abusing the server as a public file storage service.
Vulnerability Details
EPSS (30-day exploit probability)
EPSS: 0.1%
Classification
Attack SophisticationTrivial
Affected Packages
gogs.io/gogs@< 0.14.1 (fixed: 0.14.1)
Original source: https://github.com/advisories/GHSA-fc3h-92p8-h36f
First tracked: February 17, 2026 at 02:12 PM
Classified by LLM (prompt v3) · confidence: 95%