| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| gogs.io/gogs |
| go |
| < 0.12.9 |
| 0.12.9 |
The vulnerability stems from improper path sanitization in Windows environments. The commit diff shows the Clean function was modified to add backslash replacement (strings.ReplaceAll(p, \, "/")). The test cases added in pathutil_test.go demonstrate Windows-style path traversal attempts that were previously unhandled. The Clean function's failure to normalize Windows path separators before sanitization allowed bypassing directory restrictions, making it the clear vulnerable function.
KEV Misses 88% of Exploited CVEs- Get the report