Untriaged
Permalink
CVE-2026-29084
4.6 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
Activity log
- Created suggestion
Gokapi: CSRF in Login Endpoint
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, the login flow accepts credential-bearing requests without CSRF protection mechanisms tied to the browser session context. The handler parses form values directly and creates a session on successful credential validation. This issue has been patched in version 2.2.3.
References
-
https://github.com/Forceu/Gokapi/security/advisories/GHSA-hcff-qv74-7hr4 x_refsource_CONFIRM
-
https://github.com/Forceu/Gokapi/releases/tag/v2.2.3 x_refsource_MISC
Affected products
Gokapi
- ==< 2.2.3
Package maintainers
-
@delliottxyz Darragh Elliott <me+git@delliott.xyz>