Gogs is an open source self-hosted Git service. In application version 0.14.0+dev and prior, there is a stored cross-site scripting (XSS) vulnerability present in Gogs, which allows client-side Javascript code execution. The vulnerability is caused by the usage of a vulnerable and outdated component: pdfjs-1.4.20 under public/plugins/. This issue has been fixed for gogs.io/gogs in version 0.13.3.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Jul 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 24 Jun 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Jun 2025 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Gogs is an open source self-hosted Git service. In application version 0.14.0+dev and prior, there is a stored cross-site scripting (XSS) vulnerability present in Gogs, which allows client-side Javascript code execution. The vulnerability is caused by the usage of a vulnerable and outdated component: pdfjs-1.4.20 under public/plugins/. This issue has been fixed for gogs.io/gogs in version 0.13.3. | |
Title | Gogs stored XSS in PDF renderer | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-24T03:48:06.012Z
Updated: 2025-07-30T17:45:57.812Z
Reserved: 2025-05-14T10:32:43.530Z
Link: CVE-2025-47943

Updated: 2025-06-24T21:48:42.035Z

Status : Awaiting Analysis
Published: 2025-06-24T04:15:46.743
Modified: 2025-07-30T18:15:40.640
Link: CVE-2025-47943

No data.