Untriaged
Permalink
CVE-2026-30955
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Activity log
- Created suggestion
Gokapi vulnerable to DoS in E2E Metadata Parser
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to 2.2.4, An API endpoint accepts unbounded request bodies without any size limit. An authenticated user can cause an OOM kill and complete service disruption for all users. This vulnerability is fixed in 2.2.4.
References
-
https://github.com/Forceu/Gokapi/security/advisories/GHSA-qwc6-vc2v-2ggj x_refsource_CONFIRM
-
https://github.com/Forceu/Gokapi/releases/tag/v2.2.4 x_refsource_MISC
Affected products
Gokapi
- ==< 2.2.4
Package maintainers
-
@delliottxyz Darragh Elliott <me+git@delliott.xyz>