It was confirmed in a test environment that an attacker can store an HTML/JavaScript payload in a repository’s Milestone name, and when another user selects that Milestone on the New Issue page (/issues/new), a DOM-Based XSS is triggered.
(The impact scope depends on the victim’s permission level.)
A fix is available at https://github.com/gogs/gogs/releases/tag/v0.14.2
{
"github_reviewed": true,
"nvd_published_at": "2026-03-05T19:16:04Z",
"cwe_ids": [
"CWE-79"
],
"github_reviewed_at": "2026-03-05T20:16:20Z",
"severity": "HIGH"
}