Impact
A registered user who normally cannot create or modify file requests can generate a short‑lived API key that grants those privileges. The key is valid for a limited period, but during that time it allows the user to create or alter file requests, potentially exposing sensitive files or bypassing workflow controls. The weakness corresponds to improper privilege handling (CWE‑284).
Affected Systems
Forceu Gokapi servers running any version before 2.2.3 are affected. The issue is resolved in version 2.2.3 and newer. No impact exists if no users have access to the admin/upload menu.
Risk and Exploitability
The CVSS score of 5 indicates moderate risk, while an EPSS score of less than 1% suggests a very low yet non‑zero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a legitimate registered account and involves creating an API key; the attack vector is likely local or web‑based via the Gokapi API.
OpenCVE Enrichment
Github GHSA