Home

Description

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to 2.2.4, the chunked upload completion path for file requests does not validate the total file size against the per-request MaxSize limit. An attacker with a public file request link can split an oversized file into chunks each under MaxSize and upload them sequentially, bypassing the size restriction entirely. Files up to the server's global MaxFileSizeMB are accepted regardless of the file request's configured limit. This vulnerability is fixed in 2.2.4.

PUBLISHED Reserved 2026-03-07 | Published 2026-03-13 | Updated 2026-03-13 | Assigner GitHub_M




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 2.2.4
affected

References

github.com/...Gokapi/security/advisories/GHSA-45vh-rpc8-hxpp

github.com/Forceu/Gokapi/releases/tag/v2.2.4

cve.org (CVE-2026-30961)

nvd.nist.gov (CVE-2026-30961)

Download JSON