Dec 10, 2025 • Wiz Security Research
Gogs 0-Day Exploited in the Wild
Wiz Threat Research has confirmed active exploitation of a previously unknown vulnerability, identified as CVE-2025-8110, affecting the Gogs self-hosted Git...
Executive Summary
Wiz Threat Research has confirmed active exploitation of a previously unknown vulnerability, identified as CVE-2025-8110, affecting the Gogs self-hosted Git service. This zero-day vulnerability is currently being leveraged by threat actors in the wild, posing a significant risk to organizations utilizing this platform for source code management. While specific attribution to a named threat group or associated malware family has not been disclosed in this report, the active exploitation status indicates an immediate threat to confidentiality and integrity. Organizations are urged to prioritize patching or implementing compensating controls immediately to prevent unauthorized access. The severity is assessed as high due to the active nature of the campaign. Further monitoring is recommended to identify potential post-exploitation activities, such as data exfiltration or cryptocurrency mining, which often accompany such intrusions. Immediate vulnerability management is crucial.
Summary
Wiz Threat Research has observed exploitation in-the-wild of CVE-2025-8110
Published Analysis
Wiz Threat Research has confirmed active exploitation of a previously unknown vulnerability, identified as CVE-2025-8110, affecting the Gogs self-hosted Git service. This zero-day vulnerability is currently being leveraged by threat actors in the wild, posing a significant risk to organizations utilizing this platform for source code management. While specific attribution to a named threat group or associated malware family has not been disclosed in this report, the active exploitation status indicates an immediate threat to confidentiality and integrity. Organizations are urged to prioritize patching or implementing compensating controls immediately to prevent unauthorized access. The severity is assessed as high due to the active nature of the campaign. Further monitoring is recommended to identify potential post-exploitation activities, such as data exfiltration or cryptocurrency mining, which often accompany such intrusions. Immediate vulnerability management is crucial. Wiz Threat Research has observed exploitation in-the-wild of CVE-2025-8110 Wiz Threat Research has observed exploitation in-the-wild of CVE-2025-8110
Linked Entities
- CVE-2025-8110