Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. This makes permanent API credentials accessible to any script running in the browser context.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9f8m-9547-2gqm | Gophish is vulnerable to Incorrect Access Control |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/gophish/gophish/issues/9366 |
|
History
Fri, 06 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 CWE-922 |
|
| Metrics |
cvssV3_1
|
Fri, 06 Feb 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. This makes permanent API credentials accessible to any script running in the browser context. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-06T18:37:19.153Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70963
Updated: 2026-02-06T18:34:41.835Z
Status : Received
Published: 2026-02-06T18:15:55.510
Modified: 2026-02-06T19:16:08.070
Link: CVE-2025-70963
No data.
OpenCVE Enrichment
No data.
Github GHSA