Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-20736

CVE-2026-20736: Gitea Auth Bypass Vulnerability

CVE-2026-20736 is an authentication bypass flaw in Gitea that allows users to delete attachments from repositories they no longer have access to. This article covers technical details, affected versions, and mitigation.

Published: January 23, 2026

CVE-2026-20736 Overview

Gitea, a popular self-hosted Git service, contains an improper access control vulnerability in its attachment deletion functionality. The vulnerability exists because Gitea does not properly verify the repository context when processing attachment deletion requests. A user who previously uploaded an attachment to a repository may be able to delete it after losing access to that repository by routing the deletion request through a different repository to which they still have access.

Critical Impact

This vulnerability enables unauthorized deletion of repository attachments by exploiting improper access control checks, potentially allowing former collaborators to tamper with repository data and disrupt project integrity.

Affected Products

  • Gitea versions prior to 1.25.4

Discovery Timeline

  • 2026-01-22 - CVE-2026-20736 published to NVD
  • 2026-01-22 - Last updated in NVD database

Technical Details for CVE-2026-20736

Vulnerability Analysis

This vulnerability is classified under CWE-284 (Improper Access Control), which describes a failure to properly restrict access to resources or functionality. In the context of Gitea, the attachment deletion endpoint does not adequately validate that the requesting user has current access to the specific repository where the attachment resides. Instead, the system appears to check only whether the user has access to any repository through which the request is routed.

The core issue stems from an authorization logic flaw where the deletion operation validates user permissions against the wrong repository context. When a user makes a deletion request, Gitea verifies access to the repository specified in the request path rather than confirming the user's current access rights to the repository that actually owns the attachment.

Root Cause

The root cause is an improper access control implementation in Gitea's attachment handling code. The system fails to enforce proper context validation, allowing cross-repository operations that bypass intended access restrictions. Specifically, the attachment deletion handler does not verify that the authenticated user has current permissions for the repository where the target attachment is stored, only checking permissions for the repository through which the request is made.

Attack Vector

An attacker can exploit this vulnerability through the following scenario:

  1. User A uploads an attachment to Repository X while they have access
  2. User A's access to Repository X is revoked (removed as collaborator)
  3. User A retains access to Repository Y
  4. User A sends a deletion request for the attachment (originally uploaded to Repository X) through Repository Y's API endpoint
  5. Gitea validates User A's access to Repository Y but processes the deletion for Repository X's attachment

The vulnerability allows the attacker to delete attachments they previously uploaded even after losing legitimate access to the repository, as long as they can route the request through another accessible repository. This could result in data loss, disruption of repository content, or manipulation of issue and pull request attachments.

Detection Methods for CVE-2026-20736

Indicators of Compromise

  • Unexpected deletion of attachments from repositories, particularly those uploaded by users who no longer have access
  • Audit logs showing attachment deletion requests routed through repositories different from where the attachments are stored
  • User complaints about missing attachments in issues or pull requests

Detection Strategies

  • Review Gitea access logs for attachment deletion API calls, particularly examining the repository context versus the actual attachment location
  • Monitor for patterns where users are making attachment-related API calls to repositories they don't have explicit access to
  • Implement alerting on attachment deletions performed by users who are not current collaborators of the target repository

Monitoring Recommendations

  • Enable detailed audit logging in Gitea to track all attachment operations
  • Correlate user access changes (collaborator removals) with subsequent attachment deletion events
  • Review historical attachment deletion logs for anomalies after upgrading to identify potential past exploitation

How to Mitigate CVE-2026-20736

Immediate Actions Required

  • Upgrade Gitea to version 1.25.4 or later immediately
  • Review recent attachment deletions in your Gitea instance for suspicious activity
  • Audit collaborator access changes and correlate with any unexpected attachment deletions
  • Consider temporarily restricting attachment deletion capabilities if immediate patching is not possible

Patch Information

Gitea has addressed this vulnerability in version 1.25.4. The fix implements proper repository context validation during attachment deletion operations, ensuring that the user's current access rights to the attachment's actual repository are verified before processing the deletion.

For detailed information about the fix, refer to the following resources:

  • Gitea Release Announcement
  • Gitea Pull Request #36320
  • Gitea Version 1.25.4 Release Notes
  • GitHub Security Advisory GHSA-jr6h-pwwp-c8g6

Workarounds

  • Restrict API access to attachment endpoints at the reverse proxy or firewall level until patching is complete
  • Limit attachment upload permissions to reduce the attack surface
  • Implement additional access logging at the network layer to track suspicious API calls
  • Regularly audit and clean up stale user permissions to minimize the window of opportunity for exploitation
bash
# Upgrade Gitea to patched version
# Stop the Gitea service
systemctl stop gitea

# Download and install version 1.25.4 or later
wget https://github.com/go-gitea/gitea/releases/download/v1.25.4/gitea-1.25.4-linux-amd64
chmod +x gitea-1.25.4-linux-amd64
mv gitea-1.25.4-linux-amd64 /usr/local/bin/gitea

# Restart the Gitea service
systemctl start gitea

# Verify the upgrade
gitea --version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechGitea

  • SeverityNONE

  • CVSS ScoreN/A

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-284
  • Technical References
  • Gitea Release Announcement

  • Gitea Pull Request Update

  • Gitea Version Release Notes

  • GitHub Security Advisory GHSA-jr6h-pwwp-c8g6
  • Related CVEs
  • CVE-2026-20912: Gitea Auth Bypass Vulnerability

  • CVE-2026-20904: Gitea Auth Bypass Vulnerability

  • CVE-2026-20897: Gitea Auth Bypass Vulnerability

  • CVE-2026-20888: Gitea Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English