Affected by GO-2023-1894
and 10 other vulnerabilities
GO-2023-1894: code.gitea.io/gitea Open Redirect vulnerability
GO-2024-3056: Gitea Cross-site Scripting Vulnerability in code.gitea.io/gitea
GO-2025-4258: Gitea mishandles authorization for deletion of releases in code.gitea.io/gitea
GO-2025-4261: Gitea allows attackers to add attachments with forbidden file extensions in code.gitea.io/gitea
GO-2025-4262: Gitea: anonymous user can visit private user's project in code.gitea.io/gitea
GO-2025-4263: Gitea allows XSS because the search input box (for creating tags and branches) is v-html instead of v-text in code.gitea.io/gitea
GO-2025-4264: Gitea sometimes mishandles propagation of token scope for access control within one of its own package registries in code.gitea.io/gitea
GO-2025-4265: Gitea vulnerable to Cross-site Scripting in code.gitea.io/gitea
GO-2025-4266: Gitea inadvertently discloses users' login times by allowing (for example) the lastlogintime explore/users sort order in code.gitea.io/gitea
GO-2025-4267: Gitea doesn't adequately enforce branch deletion permissions after merging a pull request. in code.gitea.io/gitea
GO-2025-4268: Gitea mishandles access to a private resource upon receiving an API token with scope limited to public resources in code.gitea.io/gitea
CreateWatcher creates a watcher labelled with the provided description and running with the provided options.
The created watcher will create a subcontext from the provided ctx and register it with the process manager.
type CreateWatcherOpts struct {
// PathsCallback is used to set the required paths to watch PathsCallback func(func(path, name string, d fs.DirEntry, err error) error) error// BeforeCallback is called before any files are watched BeforeCallback func()
// Between Callback is called between after a watched event has occurred BetweenCallback func()
// AfterCallback is called as this watcher ends AfterCallback func()
}
CreateWatcherOpts are options to configure the watcher