Gitea

9 CVEs product

Monthly

CVE-2026-20912 CRITICAL PATCH Act Now

Gitea fails to validate repository ownership when linking attachments to releases, allowing users to attach files from one repository to releases in another.

Authentication Bypass Gitea Redhat Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-20904 MEDIUM PATCH This Month

Gitea's OpenID URI visibility controls lack proper ownership validation, allowing authenticated users to modify the visibility settings of other users' OpenID identities. This integrity bypass affects any Gitea instance where multiple users manage OpenID configurations, enabling account enumeration or information disclosure through unauthorized visibility changes. A patch is available to remediate this medium-severity vulnerability.

Authentication Bypass Gitea Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-20897 CRITICAL PATCH Act Now

Gitea fails to validate repository ownership when deleting Git LFS locks, allowing users with write access to one repo to delete LFS locks in other repositories.

Authentication Bypass Gitea Redhat Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-20888 MEDIUM PATCH This Month

Gitea fails to enforce proper authorization checks when users attempt to cancel scheduled auto-merges through the web interface, allowing any user with pull request read access to cancel merge operations initiated by other users. This authorization bypass could disrupt automated workflows and merge processes across repositories. A patch is available to address this vulnerability.

Authentication Bypass Gitea Redhat Suse
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-20883 MEDIUM PATCH This Month

Gitea's stopwatch API fails to re-validate repository access permissions, allowing revoked users to access sensitive information through active stopwatch sessions. An authenticated attacker with prior access to a private repository can enumerate issue titles and repository names even after their permissions have been removed. A patch is available to enforce proper access control validation.

Authentication Bypass Gitea Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-20800 MEDIUM PATCH This Month

Gitea's notification API fails to re-validate repository access permissions when retrieving notification details, allowing users with revoked access to private repositories to continue viewing issue and pull request titles through cached notifications. An authenticated attacker can exploit this to maintain visibility into sensitive repository content after their access has been removed. A patch is available.

Information Disclosure Gitea Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-20750 CRITICAL PATCH Act Now

Gitea does not properly validate project ownership in organization operations, allowing users with project write access to manipulate projects belonging to other organizations.

Authentication Bypass Gitea Redhat Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-20736 HIGH PATCH This Week

Gitea fails to properly validate repository ownership when processing attachment deletion requests, allowing an authenticated attacker to delete files from repositories they no longer have access to by routing deletion requests through a different accessible repository. This authorization bypass affects all users who have uploaded attachments to shared repositories and could result in loss of critical project documentation or resources. A patch is available to address this improper access control vulnerability.

Authentication Bypass Gitea Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-69413 MEDIUM PATCH This Month

In Gitea before 1.25.2, /api/v1/user has different responses for failed authentication depending on whether a username exists. [CVSS 5.3 MEDIUM]

Information Disclosure Gitea Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-20912
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

Gitea fails to validate repository ownership when linking attachments to releases, allowing users to attach files from one repository to releases in another.

Authentication Bypass Gitea Redhat +1
NVD GitHub
CVE-2026-20904
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Gitea's OpenID URI visibility controls lack proper ownership validation, allowing authenticated users to modify the visibility settings of other users' OpenID identities. This integrity bypass affects any Gitea instance where multiple users manage OpenID configurations, enabling account enumeration or information disclosure through unauthorized visibility changes. A patch is available to remediate this medium-severity vulnerability.

Authentication Bypass Gitea Redhat +1
NVD GitHub
CVE-2026-20897
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

Gitea fails to validate repository ownership when deleting Git LFS locks, allowing users with write access to one repo to delete LFS locks in other repositories.

Authentication Bypass Gitea Redhat +1
NVD GitHub
CVE-2026-20888
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Gitea fails to enforce proper authorization checks when users attempt to cancel scheduled auto-merges through the web interface, allowing any user with pull request read access to cancel merge operations initiated by other users. This authorization bypass could disrupt automated workflows and merge processes across repositories. A patch is available to address this vulnerability.

Authentication Bypass Gitea Redhat +1
NVD GitHub
CVE-2026-20883
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Gitea's stopwatch API fails to re-validate repository access permissions, allowing revoked users to access sensitive information through active stopwatch sessions. An authenticated attacker with prior access to a private repository can enumerate issue titles and repository names even after their permissions have been removed. A patch is available to enforce proper access control validation.

Authentication Bypass Gitea Redhat +1
NVD GitHub
CVE-2026-20800
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Gitea's notification API fails to re-validate repository access permissions when retrieving notification details, allowing users with revoked access to private repositories to continue viewing issue and pull request titles through cached notifications. An authenticated attacker can exploit this to maintain visibility into sensitive repository content after their access has been removed. A patch is available.

Information Disclosure Gitea Suse
NVD GitHub
CVE-2026-20750
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

Gitea does not properly validate project ownership in organization operations, allowing users with project write access to manipulate projects belonging to other organizations.

Authentication Bypass Gitea Redhat +1
NVD GitHub
CVE-2026-20736
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Gitea fails to properly validate repository ownership when processing attachment deletion requests, allowing an authenticated attacker to delete files from repositories they no longer have access to by routing deletion requests through a different accessible repository. This authorization bypass affects all users who have uploaded attachments to shared repositories and could result in loss of critical project documentation or resources. A patch is available to address this improper access control vulnerability.

Authentication Bypass Gitea Redhat +1
NVD GitHub
CVE-2025-69413
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

In Gitea before 1.25.2, /api/v1/user has different responses for failed authentication depending on whether a username exists. [CVSS 5.3 MEDIUM]

Information Disclosure Gitea Redhat +1
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy