Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30943: CWE-863: Incorrect Authorization in Forceu Gokapi

0
Medium
VulnerabilityCVE-2026-30943cvecve-2026-30943cwe-863
Published: Fri Mar 13 2026 (03/13/2026, 19:07:01 UTC)
Source: CVE Database V5
Vendor/Project: Forceu
Product: Gokapi

Description

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to 2.2.4, An insufficient authorization check in the file replace API allows a user with only list visibility permission (UserPermListOtherUploads) to delete another user's file by abusing the deleteNewFile flag, bypassing the requirement for UserPermDeleteOtherUploads. This vulnerability is fixed in 2.2.4.

AI-Powered Analysis

AILast updated: 03/13/2026, 19:44:37 UTC

Technical Analysis

The vulnerability identified as CVE-2026-30943 affects Forceu's Gokapi, a self-hosted file sharing server that supports automatic expiration and encryption. Prior to version 2.2.4, the file replace API contains an insufficient authorization check related to the deleteNewFile flag. Specifically, a user granted only the UserPermListOtherUploads permission, which normally allows viewing other users' files, can abuse this flag to delete files owned by other users. This bypasses the intended requirement for UserPermDeleteOtherUploads, a higher privilege needed to delete others' files. The flaw stems from improper enforcement of authorization logic within the API, categorized under CWE-863 (Incorrect Authorization). The vulnerability allows an authenticated user with limited permissions to perform unauthorized file deletions, impacting data integrity but not confidentiality or availability. The CVSS v3.1 base score is 4.1 (medium severity), reflecting network exploitability with low attack complexity, requiring privileges but no user interaction, and a scope change due to affecting other users' files. The vulnerability was published on March 13, 2026, and is fixed in Gokapi version 2.2.4. No public exploits or active exploitation have been reported to date.

Potential Impact

This vulnerability primarily impacts the integrity of data stored on Gokapi servers by allowing unauthorized deletion of files owned by other users. Organizations relying on Gokapi for file sharing may face data loss or disruption of workflows if malicious or careless users exploit this flaw. Although confidentiality and availability remain unaffected, unauthorized deletions can lead to operational inefficiencies, potential data recovery costs, and loss of trust among users. In multi-tenant or collaborative environments, this could also result in internal conflicts or compliance issues if sensitive files are deleted without proper authorization. Since exploitation requires authenticated access with list visibility permissions, insider threats or compromised accounts pose the greatest risk. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially in environments where Gokapi is widely deployed.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade all Gokapi instances to version 2.2.4 or later, where the authorization check is properly enforced. Until upgrades can be applied, administrators should restrict UserPermListOtherUploads permissions to only trusted users and monitor file deletion activities closely. Implementing detailed audit logging for file operations can help detect suspicious deletions. Additionally, enforcing strong authentication mechanisms and regularly reviewing user permissions will reduce the risk of exploitation. Network-level controls such as segmentation and limiting access to the Gokapi server can further reduce exposure. Finally, educating users about the risks of privilege misuse and promptly revoking permissions for inactive or untrusted accounts will help contain potential abuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T17:34:39.979Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b465b22f860ef9438da281

Added to database: 3/13/2026, 7:29:54 PM

Last enriched: 3/13/2026, 7:44:37 PM

Last updated: 3/13/2026, 8:56:45 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses