Gitea version 1.22.0 is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability. This security flaw enables a malicious actor to insert harmful scripts that are stored on the server and run within the context of another user's session.
This exploit allows an attacker to execute arbitrary code remotely on a Gitea 1.4.0 server without authentication. The attacker can create a fake OID for the app.ini file and trigger the execution of arbitrary commands.
This module exploits Git fetch command in Gitea repository migration process that leads to a remote command execution on the system. This vulnerability affects Gitea before version 1.16.7.
Gitea is vulnerable to authenticated remote code execution. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable server. This vulnerability affects Gitea versions >= 1.1.0 to <= 1.12.5. The vulnerability is due to the lack of proper input validation in the 'user/settings/ssh' endpoint. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable server.