CVE-2025-48494

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. When using end-to-end encryption, a stored cross-site scripting vulnerability can be exploited by uploading a file with JavaScript code embedded in the filename. After upload and every time someone opens the upload list, the script is then parsed. Prior to version 2.0.0, there was no user permission system implemented, therefore all authenticated users were already able to see and modify all resources, even if end-to-end encrypted, as the encryption key had to be the same for all users using a version prior to 2.0.0. If a user is the only authenticated user using Gokapi, they are not affected. This issue has been fixed in v2.0.0. A possible workaround would be to disable end-to-end encryption.
Configurations

Configuration 1 (hide)

cpe:2.3:a:forceu:gokapi:*:*:*:*:*:*:*:*

History

26 Aug 2025, 17:28

Type Values Removed Values Added
Summary
  • (es) Gokapi es un servidor de intercambio de archivos autoalojado con expiración automática y compatibilidad con cifrado. Al usar cifrado de extremo a extremo, se puede explotar una vulnerabilidad de cross-site-scripting almacenado al subir un archivo con código JavaScript incrustado en el nombre. Tras la subida, y cada vez que alguien abre la lista de subidas, se analiza el script. Antes de la versión 2.0.0, no se implementaba un sistema de permisos de usuario, por lo que todos los usuarios autenticados podían ver y modificar todos los recursos, incluso con cifrado de extremo a extremo, ya que la clave de cifrado debía ser la misma para todos los usuarios de una versión anterior a la 2.0.0. Si un usuario es el único autenticado que usa Gokapi, no se ve afectado. Este problema se ha solucionado en la versión 2.0.0. Un posible workaround sería desactivar el cifrado de extremo a extremo.
First Time Forceu
Forceu gokapi
References () https://github.com/Forceu/Gokapi/commit/343cc566cfd7f4efcd522c92371561d494aed6b0 - () https://github.com/Forceu/Gokapi/commit/343cc566cfd7f4efcd522c92371561d494aed6b0 - Patch
References () https://github.com/Forceu/Gokapi/releases/tag/v2.0.0 - () https://github.com/Forceu/Gokapi/releases/tag/v2.0.0 - Release Notes
References () https://github.com/Forceu/Gokapi/security/advisories/GHSA-95rc-wc32-gm53 - () https://github.com/Forceu/Gokapi/security/advisories/GHSA-95rc-wc32-gm53 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:forceu:gokapi:*:*:*:*:*:*:*:*

02 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-02 11:15

Updated : 2025-08-26 17:28


NVD link : CVE-2025-48494

Mitre link : CVE-2025-48494

CVE.ORG link : CVE-2025-48494


JSON object : View

Products Affected

forceu

  • gokapi
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-87

Improper Neutralization of Alternate XSS Syntax