Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

gitea

About This Vendor

gitea is a technology vendor producing software and infrastructure products. As a software provider, gitea's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of gitea's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 52 known vulnerabilities from gitea. This includes 10 critical-severity issues and 14 high-severity issues that represent significant risk. These vulnerabilities affect 2 distinct products across gitea's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2018 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying gitea products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-15192 2018-08-08 2024-11-21 8.6 5.0 Likely
CVE-2018-1000803 2018-10-08 2024-11-21 5.3 5.0 Likely
CVE-2018-18926 2018-11-04 2024-11-21 9.8 7.5 Likely
CVE-2019-1000002 2019-02-04 2024-11-21 6.5 5.5 Likely
CVE-2019-11228 2019-04-15 2024-11-21 7.5 5.0 Likely
CVE-2019-11229 2019-04-15 2024-11-21 8.8 6.5 Likely
CVE-2019-11576 2019-04-28 2024-11-21 9.8 7.5 Likely
CVE-2019-10330 2019-05-31 2024-11-21 7.5 5.0 Likely
CVE-2019-1010314 2019-07-11 2024-11-21 6.1 4.3 Likely
CVE-2019-1010261 2019-07-18 2024-11-21 6.1 4.3 Likely
CVE-2020-13246 2020-05-20 2024-11-21 7.5 5.0 Likely
CVE-2020-14144 2020-10-16 2024-11-21 7.2 6.5 Likely
CVE-2020-28991 2020-11-24 2024-11-21 9.8 7.5 Likely
CVE-2021-3382 2021-02-05 2024-11-21 7.5 5.0 Likely
CVE-2021-28378 2021-03-15 2024-11-21 3.7 3.5 Unknown
CVE-2021-45325 2022-02-08 2024-11-21 7.5 5.0 Likely
CVE-2021-45326 2022-02-08 2024-11-21 8.8 6.8 Likely
CVE-2021-45327 2022-02-08 2024-11-21 9.8 7.5 Likely
CVE-2021-45328 2022-02-08 2024-11-21 6.1 5.8 Likely
CVE-2021-45329 2022-02-08 2024-11-21 6.1 4.3 Likely
CVE-2021-45330 2022-02-09 2024-11-21 9.8 7.5 Likely
CVE-2021-45331 2022-02-09 2024-11-21 9.8 7.5 Likely
CVE-2022-0905 2022-03-10 2024-11-21 7.1 5.5 Likely
CVE-2021-29134 2022-03-15 2024-11-21 5.3 5.0 Likely
CVE-2022-1058 2022-03-24 2024-11-21 6.1 5.8 Likely
CVE-2022-27313 2022-05-03 2024-11-21 7.5 5.0 Likely
CVE-2022-30781 2022-05-16 2024-11-21 7.5 5.0 Likely
CVE-2022-1928 2022-05-29 2024-11-21 5.4 3.5 Unknown
CVE-2022-38183 2022-08-12 2024-11-21 6.5 - -
CVE-2022-42968 2022-10-16 2025-05-14 9.8 - -
CVE-2022-46685 2022-12-12 2025-04-23 4.3 - -
CVE-2023-3515 2023-07-05 2024-11-21 4.4 - -
CVE-2022-38795 2023-08-07 2024-11-21 6.5 - -
CVE-2025-68938 2025-12-26 2026-01-02 4.3 - -
CVE-2025-68939 2025-12-26 2026-01-02 8.2 - -
CVE-2025-68940 2025-12-26 2026-01-02 3.1 - -
CVE-2025-68941 2025-12-26 2026-01-02 4.9 - -
CVE-2025-68942 2025-12-26 2026-01-02 5.4 - -
CVE-2025-68943 2025-12-26 2025-12-31 5.3 - -
CVE-2025-68944 2025-12-26 2025-12-31 5.0 - -
CVE-2025-68945 2025-12-26 2025-12-31 5.8 - -
CVE-2025-68946 2025-12-26 2025-12-31 5.4 - -
CVE-2025-69413 2026-01-01 2026-01-06 5.3 - -
CVE-2026-0798 2026-01-22 2026-01-29 3.5 - -
CVE-2026-20736 2026-01-22 2026-01-29 7.5 - -
CVE-2026-20750 2026-01-22 2026-01-29 9.1 - -
CVE-2026-20800 2026-01-22 2026-01-29 6.5 - -
CVE-2026-20883 2026-01-22 2026-01-29 6.5 - -
CVE-2026-20888 2026-01-22 2026-01-29 4.3 - -
CVE-2026-20897 2026-01-22 2026-01-29 9.1 - -
CVE-2026-20904 2026-01-22 2026-01-29 6.5 - -
CVE-2026-20912 2026-01-22 2026-01-29 9.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for gitea by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with gitea's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.