Untriaged
Permalink
CVE-2026-29060
5.0 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): LOW
Activity log
- Created suggestion
Gokapi: Privilege escalation with auth token
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a registered user without privileges to create or modify file requests is able to create a short-lived API key that has the permission to do so. The user must be registered with Gokapi. If there are no users with access to the admin/upload menu, there is no impact. This issue has been patched in version 2.2.3.
References
-
https://github.com/Forceu/Gokapi/security/advisories/GHSA-m2hx-wjxc-9fp4 x_refsource_CONFIRM
-
https://github.com/Forceu/Gokapi/releases/tag/v2.2.3 x_refsource_MISC
Affected products
Gokapi
- ==< 2.2.3
Package maintainers
-
@delliottxyz Darragh Elliott <me+git@delliott.xyz>