-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| gogs.io/gogs | go | < 0.12.9 | 0.12.9 |
The vulnerability stems from unsanitized DisplayName values being rendered in the issue list template. The GitHub patch shows the critical change was adding the Sanitize filter before Safe in templates/repo/issue/list.tmpl. This indicates the original code path (without Sanitize) failed to properly neutralize user-controlled input before outputting HTML, meeting CWE-79 criteria. The template's {{.Poster.DisplayName | Safe}} construct prior to patching was the vulnerable entry point.
A Semantic Attack on Google Gemini - Read the Latest Research