Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hcff-qv74-7hr4 | Gokapi has CSRF in Login Endpoint |
Mon, 09 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:forceu:gokapi:*:*:*:*:*:*:*:* |
Fri, 06 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Forceu
Forceu gokapi |
|
| Vendors & Products |
Forceu
Forceu gokapi |
Fri, 06 Mar 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, the login flow accepts credential-bearing requests without CSRF protection mechanisms tied to the browser session context. The handler parses form values directly and creates a session on successful credential validation. This issue has been patched in version 2.2.3. | |
| Title | Gokapi: CSRF in Login Endpoint | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T16:06:15.878Z
Reserved: 2026-03-03T20:51:43.484Z
Link: CVE-2026-29084
Updated: 2026-03-06T15:50:30.378Z
Status : Analyzed
Published: 2026-03-06T05:16:41.180
Modified: 2026-03-09T18:53:50.580
Link: CVE-2026-29084
No data.
OpenCVE Enrichment
Updated: 2026-04-16T11:45:26Z
Github GHSA