Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.1

Gogs Allows Comment Deletion in Other Repositories

CVE-2026-25120 GHSA-jj5m-h57j-5gv7
Summary

A security weakness in Gogs allows a repository administrator to delete comments from other repositories. This is a concern for Gogs users who rely on comment moderation and repository security. To protect your repository, update to the latest version of Gogs.

What to do
  • Update gogs.io gogs to version 0.14.0.
Affected software
VendorProductAffected versionsFix available
gogs.io gogs <= 0.13.4 0.14.0
gogs gogs <= 0.14.0 –
Original title
Gogs Allows Cross-Repository Comment Deletion via DeleteComment
Original description
# IDOR: Cross-Repository Comment Deletion via DeleteComment

## Summary

The `POST /:owner/:repo/issues/comments/:id/delete` endpoint does not verify that the comment belongs to the repository specified in the URL. This allows a repository administrator to delete comments from any other repository by supplying arbitrary comment IDs, bypassing authorization controls.

## Vulnerability Details

| Field | Value |
|-------|-------|
| Affected File | `internal/route/repo/issue.go` |
| Affected Function | `DeleteComment` (lines 955-968) |
| Secondary File | `internal/database/comment.go` |
| Secondary Function | `DeleteCommentByID` (lines 505-520) |

## Root Cause

The vulnerability exists due to insufficient authorization validation in the comment deletion flow:

### 1. Missing Repository Ownership Check in DeleteComment

In `internal/route/repo/issue.go`, the function retrieves a comment by ID without verifying repository ownership:

```go
func DeleteComment(c *context.Context) {
comment, err := database.GetCommentByID(c.ParamsInt64(":id"))
if err != nil {
c.NotFoundOrError(err, "get comment by ID")
return
}

// Only checks if user is comment poster OR admin of the CURRENT repo (from URL)
if c.UserID() != comment.PosterID && !c.Repo.IsAdmin() {
c.NotFound()
return
} else if comment.Type != database.CommentTypeComment {
c.Status(http.StatusNoContent)
return
}

// No verification that comment.IssueID belongs to c.Repo.Repository.ID!
if err = database.DeleteCommentByID(c.User, comment.ID); err != nil {
c.Error(err, "delete comment by ID")
return
}

c.Status(http.StatusOK)
}
```

### 2. Database Layer Performs No Authorization

In `internal/database/comment.go`, the deletion function performs no repository validation:

```go
func DeleteCommentByID(doer *User, id int64) error {
comment, err := GetCommentByID(id)
if err != nil {
if IsErrCommentNotExist(err) {
return nil
}
return err
}

// Directly deletes without checking repository ownership
sess := x.NewSession()
defer sess.Close()
if err = sess.Begin(); err != nil {
return err
}

if _, err = sess.ID(comment.ID).Delete(new(Comment)); err != nil {
// ...
}
// ...
}
```

## Proof of Concept

### Prerequisites

1. Two users: **Alice** (attacker) and **Bob** (victim)
2. Alice is admin of `alice/attacker-repo`
3. Bob has created an issue with a comment on `bob/victim-repo`
4. Attacker needs to obtain the comment ID from victim's repository (e.g., ID: 42)

### HTTP Request

```http
POST /alice/attacker-repo/issues/comments/42/delete HTTP/1.1
Host: gogs.example.com
Cookie: i_like_gogs=<alice_session_token>

```
nvd CVSS3.1 2.7
nvd CVSS4.0 5.1
Vulnerability type
CWE-639 Authorization Bypass Through User-Controlled Key
Published: 17 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026