CVE-2026-29084

4.6 MEDIUM

📋 TL;DR

CVE-2026-29084 is a Cross-Site Request Forgery (CSRF) vulnerability in Gokapi self-hosted file sharing server that allows attackers to trick authenticated users into performing unintended login actions. This affects all Gokapi instances running versions before 2.2.3. Attackers could potentially force users to authenticate with attacker-controlled credentials.

💻 Affected Systems

Products:
  • Gokapi
Versions: All versions prior to 2.2.3
Operating Systems: All platforms running Gokapi
Default Config Vulnerable: ⚠️ Yes
Notes: All Gokapi deployments with web interface accessible are affected. The vulnerability exists in the login flow regardless of authentication backend configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could hijack user sessions by forcing authentication with attacker-controlled credentials, potentially gaining unauthorized access to file sharing functionality and sensitive data.

🟠

Likely Case

Attackers could perform session fixation attacks or force users to authenticate with compromised credentials, leading to unauthorized access to the Gokapi interface.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is limited to targeted attacks requiring user interaction with malicious content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be tricked into visiting a malicious website while having an active session or being logged into Gokapi. No authentication is required to initiate the attack, but user interaction is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.3

Vendor Advisory: https://github.com/Forceu/Gokapi/security/advisories/GHSA-hcff-qv74-7hr4

Restart Required: Yes

Instructions:

1. Backup your Gokapi configuration and data. 2. Download Gokapi version 2.2.3 from the official releases. 3. Replace the existing Gokapi installation with the new version. 4. Restart the Gokapi service. 5. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Implement CSRF Protection Proxy

all

Deploy a reverse proxy or web application firewall that adds CSRF tokens to login requests

# Configure nginx with CSRF protection module
# or use WAF rules to validate session tokens

Restrict Access

linux

Limit Gokapi access to trusted networks only using firewall rules

iptables -A INPUT -p tcp --dport [GOKAPI_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [GOKAPI_PORT] -j DROP

🧯 If You Can't Patch

  • Deploy Gokapi behind a reverse proxy with CSRF protection enabled
  • Implement network segmentation to restrict Gokapi access to internal networks only

🔍 How to Verify

Check if Vulnerable:

Check Gokapi version via web interface or configuration file. If version is below 2.2.3, the system is vulnerable.

Check Version:

Check the version.txt file in Gokapi installation directory or view the version in the web interface footer.

Verify Fix Applied:

After updating, verify the version shows 2.2.3 or higher in the web interface or configuration.

📡 Detection & Monitoring

Log Indicators:

  • Multiple login attempts from same IP with different user agents
  • Login requests missing referrer headers or CSRF tokens

Network Indicators:

  • HTTP POST requests to /login endpoint without proper referrer headers
  • Cross-origin requests to Gokapi login endpoint

SIEM Query:

source="gokapi.log" AND (uri_path="/login" AND http_method="POST") AND NOT (http_referer CONTAINS "gokapi")

🔗 References

📤 Share & Export