Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Iran’s Infy APT resurfaces with new malware activity after years of silence

‘It felt so wrong’: Colin Angle on iRobot, the FTC, and the Amazon deal that never was

New York Governor Kathy Hochul signs RAISE Act regulating AI safety

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Unpatched Gog exploits zero-day in over 700 instances in active attack
Identity

Unpatched Gog exploits zero-day in over 700 instances in active attack

userBy userDecember 11, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 11, 2025Ravi LakshmananVulnerability / Cloud Security

New research from Wiz reveals that Gogs is actively exploiting unpatched high-severity security vulnerabilities, with over 700 compromised instances accessible over the internet.

This flaw, tracked as CVE-2025-8110 (CVSS score: 8.7), is a case of file overwriting in the file update API of a Go-based self-hosted Git service. A fix for this issue is said to be currently in the works. The company said it discovered the zero-day flaw by chance in July 2025 while investigating a malware infection on a customer’s machine.

According to the vulnerability description on CVE.org, “Improper symbolic link handling in Gogs’ PutContents API could lead to local code execution.”

According to the cloud security company, CVE-2025-8110 is a bypass of a previously patched remote code execution flaw (CVE-2024-55947, CVSS score: 8.7) that allows an attacker to write files to arbitrary paths on the server and gain SSH access to the server. CVE-2024-55947 was addressed by Painter in December 2024.

cyber security

Wiz said that the fix introduced by Gogs to resolve CVE-2024-55947 could be circumvented by taking advantage of the fact that Git (and therefore Gogs) allows the use of symbolic links within git repositories, and that those symbolic links can point to files and directories outside of the repository. Additionally, the Gogs API allows you to modify files outside of the regular Git protocol.

As a result, this failure to account for symbolic links could be exploited by an attacker to execute arbitrary code via a four-step process.

Create a standard git repository Commit a single symbolic link pointing to a sensitive target Write data to a symbolic link using the PutContents API so the system follows the link and overwrites the target file outside the repository Overwrites “.git/config” (especially sshCommand) to run arbitrary commands

The malware deployed in this campaign has been assessed to have a payload based on Supershell, an open source command and control (C2) framework commonly used by Chinese hacker groups, and is able to establish a reverse SSH shell to an attacker-controlled server (‘119.45.176’).[.]196 inches).

According to Wiz, the attackers behind the CVE-2025-8110 exploit left behind repositories created on customers’ cloud workloads (e.g. “IV79VAew/Km4zoh4s”) even though they could have taken steps to delete or mark them as private after infection. It added that this carelessness was indicative of a “slam and grab” style campaign.

There are approximately 1,400 exposed Gogs instances in total, and over 700 of them show signs of compromise, specifically the presence of random 8-character owner/repository names. All identified repositories were created around July 10, 2025.

“This suggests that a single attacker, or a group of attackers using the same tool, is responsible for all infections,” said researchers Gili Tikocinsky and Yaara Shuriki.

cyber security

Given that this vulnerability has not been fixed, it is important that users disable open registration, limit Internet exposure, and scan for instances of repositories with random 8-character names.

This disclosure comes as Wiz warned that threat actors are targeting compromised GitHub Personal Access Tokens (PATs) as an expensive entry point to gain initial access to a victim’s cloud environment, as well as for lateral movement between clouds from GitHub to the cloud service provider (CSP) control plane.

The current issue is that an attacker with basic read permissions via PAT can use GitHub’s API code search to discover secret names embedded directly in the workflow’s YAML code. To further complicate matters, if the exploited PAT has write permissions, an attacker could potentially execute malicious code and remove any trace of malicious activity.

“The attackers leveraged the compromised PAT to discover GitHub Action Secrets names in the codebase and used them in newly created malicious workflows to execute code and obtain CSP secrets,” said researcher Shira Ayal. “Threat actors have also been observed to completely bypass action logs and leak secrets to webhook endpoints they control.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleProven, scalable innovation redefining PFAS remediation
Next Article Port raises $100M at $800M valuation to take on Spotify’s Backstage
user
  • Website

Related Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

‘It felt so wrong’: Colin Angle on iRobot, the FTC, and the Amazon deal that never was

New York Governor Kathy Hochul signs RAISE Act regulating AI safety

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.