Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j6jp-78w8-34x6 | Gokapi vulnerable to Privilege Escalation in File Replace |
Tue, 17 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:forceu:gokapi:*:*:*:*:*:*:*:* |
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Forceu
Forceu gokapi |
|
| Vendors & Products |
Forceu
Forceu gokapi |
Fri, 13 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to 2.2.4, An insufficient authorization check in the file replace API allows a user with only list visibility permission (UserPermListOtherUploads) to delete another user's file by abusing the deleteNewFile flag, bypassing the requirement for UserPermDeleteOtherUploads. This vulnerability is fixed in 2.2.4. | |
| Title | Gokapi has Privilege Escalation in File Replace | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-13T19:40:38.395Z
Reserved: 2026-03-07T17:34:39.979Z
Link: CVE-2026-30943
Updated: 2026-03-13T19:40:33.761Z
Status : Analyzed
Published: 2026-03-13T19:54:35.573
Modified: 2026-03-17T13:48:39.590
Link: CVE-2026-30943
No data.
OpenCVE Enrichment
Updated: 2026-03-23T13:40:19Z
Github GHSA