New Report Alert: Top Ransomware Attacks of 2025. Being Prepared for 2026

CVE-2025-8110

Improper Symbolic Link Handling in Gogs PutContents API Leading to Code Execution: CVE‑2025‑8110 Decoded

Vulnerability Overview 

CVE ID: CVE-2025-8110

CVE Title: Gogs PutContents API Symbolic Link Handling Vulnerability

Severity: High

Exploit Status: Exploitation reported in the wild

Business Risk: Attackers can overwrite files, run code, and take full control.

Summary

CVE-2025-8110 is a high-severity Gogs flaw caused by improper symlink handling in the PutContents API. It allows file overwrites outside repositories, leading to local code execution. All versions before 0.13.3 are affected and exploited. Upgrading to Gogs 0.13.3 fixes the issue.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-8110?

Technical Overview

How Does the CVE-2025-8110 Exploit Work?

The attack typically follows these steps:

CVE-2025-8110 Exploitation

What Causes CVE-2025-8110?

Vulnerability Root Cause:

The flaw is due to improper symlink handling in the Gogs PutContents API. The API checks paths but does not validate symbolic links, allowing writes outside the repository. This can modify system files and enable code execution.

How Can You Mitigate CVE-2025-8110?

If immediate patching is delayed or not possible:  

  • Turn off open registration to stop untrusted users from creating repositories.
  • Limit access to Gogs using a VPN or an IP allow list.
  • Limit the exposure of the PutContents API to trusted users only.
  • Monitor for unexpected repositories or abnormal file update activity, especially automated creations.
  • Review repository contents for symbolic links pointing outside the repository path.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-8110 Cause Downtime?

Patch application impact: Low. Updating to Gogs 0.13.3 fixes the issue with minimal downtime.

How Can You Detect CVE-2025-8110 Exploitation?

Exploitation Signatures:

MITRE ATT&CK Mapping:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Mitigation Steps if No Patch:

Remediation Timeline:

Incident Response Considerations:

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.