Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m2hx-wjxc-9fp4 | Gokapi has privilege escalation with auth token |
Mon, 09 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:forceu:gokapi:*:*:*:*:*:*:*:* |
Fri, 06 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Forceu
Forceu gokapi |
|
| Vendors & Products |
Forceu
Forceu gokapi |
Fri, 06 Mar 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a registered user without privileges to create or modify file requests is able to create a short-lived API key that has the permission to do so. The user must be registered with Gokapi. If there are no users with access to the admin/upload menu, there is no impact. This issue has been patched in version 2.2.3. | |
| Title | Gokapi: Privilege escalation with auth token | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T16:06:32.551Z
Reserved: 2026-03-03T17:50:11.244Z
Link: CVE-2026-29060
Updated: 2026-03-06T15:50:34.463Z
Status : Analyzed
Published: 2026-03-06T05:16:40.620
Modified: 2026-03-09T18:52:32.457
Link: CVE-2026-29060
No data.
OpenCVE Enrichment
Updated: 2026-04-16T11:45:26Z
Github GHSA