{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T17:55:23.446","vulnerabilities":[{"cve":{"id":"CVE-2026-29061","sourceIdentifier":"security-advisories@github.com","published":"2026-03-06T05:16:40.903","lastModified":"2026-03-09T18:50:07.253","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a privilege escalation vulnerability in the user rank demotion logic allows a demoted user's existing API keys to retain ApiPermManageFileRequests and ApiPermManageLogs permissions, enabling continued access to upload-request management and log viewing endpoints after the user has been stripped of all privileges. This issue has been patched in version 2.2.3."},{"lang":"es","value":"Gokapi es un servidor de intercambio de archivos autoalojado con expiración automática y soporte de cifrado. Antes de la versión 2.2.3, una vulnerabilidad de escalada de privilegios en la lógica de degradación de rango de usuario permite que las claves API existentes de un usuario degradado retengan los permisos ApiPermManageFileRequests y ApiPermManageLogs, lo que permite el acceso continuo a los puntos finales de gestión de solicitudes de carga y visualización de registros después de que al usuario se le hayan retirado todos los privilegios. Este problema ha sido parcheado en la versión 2.2.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:forceu:gokapi:*:*:*:*:*:*:*:*","versionEndExcluding":"2.2.3","matchCriteriaId":"8645BF69-6E20-4571-ABA4-A9C590D032C8"}]}]}],"references":[{"url":"https://github.com/Forceu/Gokapi/releases/tag/v2.2.3","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/Forceu/Gokapi/security/advisories/GHSA-q658-hfpg-35qc","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}