Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28682: CWE-284: Improper Access Control in Forceu Gokapi

0
Medium
VulnerabilityCVE-2026-28682cvecve-2026-28682cwe-284cwe-200
Published: Fri Mar 06 2026 (03/06/2026, 04:43:59 UTC)
Source: CVE Database V5
Vendor/Project: Forceu
Product: Gokapi

Description

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, the upload status SSE implementation on /uploadStatus publishes global upload state to any authenticated listener and includes file_id values that are not scoped to the requesting user. This issue has been patched in version 2.2.3.

AI-Powered Analysis

AILast updated: 03/06/2026, 05:31:32 UTC

Technical Analysis

Gokapi is a self-hosted file sharing server designed to facilitate secure file uploads with features such as automatic expiration and encryption. Prior to version 2.2.3, the SSE implementation on the /uploadStatus endpoint suffers from improper access control (CWE-284) and information exposure (CWE-200). Specifically, when an authenticated user subscribes to the upload status stream, they receive global upload state information that includes file_id values belonging to other users. This means that authenticated users can observe metadata about uploads they do not own, violating data confidentiality and potentially enabling further attacks or privacy breaches. The vulnerability does not require user interaction but does require the attacker to be authenticated, which limits exposure to some extent. The CVSS v3.1 score is 6.4 (medium), reflecting network attack vector, low attack complexity, and privileges required. The scope is changed because the vulnerability affects resources beyond the attacker’s privileges. The issue was addressed in Gokapi version 2.2.3 by properly scoping upload status information to the requesting user, preventing unauthorized data exposure. No public exploits have been reported, but the vulnerability poses a risk to any deployment of affected versions, especially in environments with multiple users sharing the same server.

Potential Impact

The primary impact of CVE-2026-28682 is unauthorized disclosure of upload metadata, including file identifiers, which can lead to privacy violations and potential information leakage about user activities. While the vulnerability does not directly allow file access or modification, the leaked metadata could be leveraged by attackers to target specific files or users for further attacks, social engineering, or reconnaissance. Organizations relying on Gokapi for secure file sharing may face compliance risks if sensitive information is exposed. The requirement for authentication limits the attack surface to insiders or compromised accounts, but in multi-tenant or shared environments, this can still be significant. The integrity of upload status information is also affected, as users receive data not scoped to their permissions. Availability is not impacted. Overall, the vulnerability undermines trust in the confidentiality and integrity of the file sharing service.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade Gokapi to version 2.2.3 or later, where the issue is patched. Until the upgrade is applied, administrators should restrict access to the /uploadStatus SSE endpoint to only trusted users and monitor authentication logs for suspicious activity. Implementing strict user authentication and session management can reduce the risk of unauthorized access. Additionally, consider isolating user sessions or deploying separate instances of Gokapi for different user groups to limit cross-user data exposure. Regularly audit access control configurations and review server logs for anomalous subscription patterns to the SSE endpoint. Employ network segmentation and firewall rules to limit access to the file sharing server from untrusted networks. Finally, educate users about the importance of safeguarding their credentials to prevent unauthorized authenticated access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-02T21:43:19.927Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aa6319c48b3f10ff135401

Added to database: 3/6/2026, 5:16:09 AM

Last enriched: 3/6/2026, 5:31:32 AM

Last updated: 3/7/2026, 6:58:33 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses