A stored XSS is present in Gogs which allows client-side Javascript code execution.
Gogs Version:
docker images
REPOSITORY TAG IMAGE ID CREATED SIZE
gogs/gogs latest fe92583bc4fe 10 hours ago 99.3MB
Application version: 0.14.0+dev
Local setup using:
# Pull image from Docker Hub.
docker pull gogs/gogs
# Create local directory for volume.
sudo mkdir -p /var/gogs
# Use `docker run` for the first time.
docker run --name=gogs -p 10022:22 -p 10880:3000 -v /var/gogs:/data gogs/gogs
The vulnerability is caused by the usage of a vulnerable and outdated component: pdfjs-1.4.20
under public/plugins/.
Read more about this vulnerability at codeanlabs - CVE-2024-4367.
Edoardo Ottavianelli
{ "nvd_published_at": "2025-06-24T04:15:46Z", "github_reviewed_at": "2025-06-26T16:54:01Z", "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "severity": "MODERATE" }