Untriaged
Permalink
CVE-2026-29061
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
Activity log
- Created suggestion
Gokapi: Privilege escalation via incomplete API-key permission revocation on user rank demotion
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a privilege escalation vulnerability in the user rank demotion logic allows a demoted user's existing API keys to retain ApiPermManageFileRequests and ApiPermManageLogs permissions, enabling continued access to upload-request management and log viewing endpoints after the user has been stripped of all privileges. This issue has been patched in version 2.2.3.
References
-
https://github.com/Forceu/Gokapi/security/advisories/GHSA-q658-hfpg-35qc x_refsource_CONFIRM
-
https://github.com/Forceu/Gokapi/releases/tag/v2.2.3 x_refsource_MISC
Affected products
Gokapi
- ==< 2.2.3
Package maintainers
-
@delliottxyz Darragh Elliott <me+git@delliott.xyz>