CVE-2026-28683
Published: 06 March 2026
Summary
CVE-2026-28683 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Forceu Gokapi. Its CVSS base score is 8.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 1.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and patching of flaws like the stored XSS in Gokapi prior to v2.2.3 to eliminate the vulnerability.
Mandates validation of uploaded files to block malicious SVGs containing executable JavaScript from being accepted into the file sharing server.
Enforces filtering of outputs when serving SVG hotlinks to neutralize embedded scripts and prevent XSS execution in victims' browsers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS via malicious SVG upload enables JS execution in victim browsers (T1059.007), session/cookie theft and hijacking (T1185, T1539), keystroke capture (T1056.001), and exploitation of the web app itself (T1190).
NVD Description
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, if a malicious authenticated user uploads SVG and creates a hotlink for it, they can achieve stored XSS. This issue has been patched…
more
in version 2.2.3.
Deeper analysisAI
CVE-2026-28683 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting Gokapi, a self-hosted file sharing server that supports automatic expiration and encryption. The flaw exists in versions prior to 2.2.3, where a malicious authenticated user can upload a specially crafted SVG file and generate a hotlink for it, embedding executable JavaScript that persists and executes in the context of other users viewing the hotlink.
An attacker with low-privilege authenticated access (PR:L) can exploit this over the network (AV:N) with low complexity (AC:L), though it requires user interaction (UI:R) such as a victim clicking or viewing the hotlinked SVG. Successful exploitation changes the scope (S:C), enabling high-impact confidentiality (C:H) and integrity (I:H) violations, such as stealing session cookies, keystrokes, or other sensitive data from affected users' browsers, with no direct availability impact (A:N). The vulnerability carries a CVSS v3.1 base score of 8.7, indicating high severity.
The issue has been addressed in Gokapi version 2.2.3, as detailed in the project's release notes and GitHub Security Advisory GHSA-3c22-5j5m-4jq7. Security practitioners should upgrade to v2.2.3 or later and review uploaded files for SVG content, particularly in multi-user environments, to mitigate risks from existing hotlinks.
Details
- CWE(s)