CVE-2026-20800
BaseFortify
Publication date: 2026-01-22
Last updated on: 2026-01-29
Assigner: Gitea Limited
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gitea | gitea | to 1.25.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Gitea's notification API occurs because it does not re-check repository access permissions when providing notification details. As a result, if a user's access to a private repository is revoked, they may still be able to see issue and pull request titles from notifications they received before losing access.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of information, as users who no longer have access to a private repository might still view sensitive issue and pull request titles. This could expose confidential project details or development activities to unintended parties.