Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.3

Gogs: Malicious Milestone Names Can Steal Data and Take Control of Issues

CVE-2026-26276 GHSA-vgjm-2cpf-4g7c
Summary

An attacker can exploit a weakness in Gogs to steal sensitive data and take control of issues in a repository. This can lead to unauthorized changes and data theft. To fix this issue, update to Gogs version 0.14.2 or later.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
gogs.io gogs <= 0.13.3
gogs gogs <= 0.14.2
Original title
Gogs: DOM-based XSS via milestone selection
Original description
# Summary

It was confirmed in a test environment that an attacker can store an HTML/JavaScript payload in a repository’s **Milestone name**, and when another user selects that Milestone on the **New Issue** page (`/issues/new`), a **DOM-Based XSS** is triggered.

# Impact

* Theft of information accessible in the victim’s session.
* Extraction of CSRF tokens and submission of state-changing requests with the victim’s privileges.
* Repository operations performed with the victim’s privileges (Issue operations, settings changes, etc.).

(The impact scope depends on the victim’s permission level.)

# Remediation

A fix is available at https://github.com/gogs/gogs/releases/tag/v0.14.2
nvd CVSS3.1 5.4
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 5 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026