Gogs <0.13.2 is vulnerable to symbolic link path traversal that enables remote code execution via the editFilePost function of internal/route/repo/editor.go.
{
"severity": "HIGH",
"nvd_published_at": "2024-11-15T17:15:20Z",
"cwe_ids": [
"CWE-22"
],
"github_reviewed": true,
"github_reviewed_at": "2024-11-15T21:09:25Z"
}