Gokapi has CSRF in Login Endpoint
Description
Published to the GitHub Advisory Database
Mar 5, 2026
Reviewed
Mar 5, 2026
Published by the National Vulnerability Database
Mar 6, 2026
Last updated
Mar 8, 2026
Summary
The login flow accepts credential-bearing requests without CSRF protection mechanisms tied to the browser session context. The handler parses form values directly and creates a session on successful credential validation.
Issue found by aisafe.io
Impact
An attacker can force a victim browser into a session associated with an existing user account where the attacker knows the credentials, causing user confusion, activity misattribution, and potential misuse of trusted user actions.
References