Intel

AIKIDO-2025-10837

github.com/go-gitea/gitea is vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere

Exposure of Sensitive System Information to an Unauthorized Control Sphere Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

15

Low Risk

This Affects:

GOgithub.com/go-gitea/gitea
1.0.0 - 1.25.1
Fixed in 1.25.2

TL;DR

Affected versions of this package are vulnerable to information leakage due to login error messages that allow user enumeration by distinguishing between non-existing users and invalid passwords, exposure of release drafts to non-writer users, and API responses that reveal signature email addresses instead of user profile emails. An attacker can exploit this by analyzing error messages to enumerate valid usernames for targeted attacks, accessing sensitive draft release information without authorization, and harvesting email addresses through API calls for phishing or spam campaigns.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

github.com/go-gitea/gitea is vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere in versions 1.0.0 - 1.25.1.

How to fix this

Upgrade the github.com/go-gitea/gitea library to the patch version.