CVE-2026-20750

CRITICAL
2026-01-22 88ee5874-cf24-4952-aea0-31affedb7ff2 GHSA-rw22-5hhq-pfpf
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
Patch Released
Jan 29, 2026 - 21:48 nvd
Patch available
CVE Published
Jan 22, 2026 - 22:16 nvd
CRITICAL 9.1

Description

Gitea does not properly validate project ownership in organization project operations. A user with project write access in one organization may be able to modify projects belonging to a different organization.

Analysis

Gitea does not properly validate project ownership in organization operations, allowing users with project write access to manipulate projects belonging to other organizations.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all Gitea instances in your environment and confirm which versions are affected; assess current user access patterns across organizations. Within 7 days: Apply the available vendor patch to all Gitea instances; conduct access reviews to identify any suspicious cross-organization project modifications. …

Sign in for detailed remediation steps.

Priority Score

46
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +46
POC: 0

Vendor Status

Share

CVE-2026-20750 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy