CVE-2025-70963

Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. This makes permanent API credentials accessible to any script running in the browser context.
References
Link Resource
https://github.com/gophish/gophish/issues/9366 Exploit Vendor Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:getgophish:gophish:*:*:*:*:*:*:*:*

History

10 Feb 2026, 18:23

Type Values Removed Values Added
References () https://github.com/gophish/gophish/issues/9366 - () https://github.com/gophish/gophish/issues/9366 - Exploit, Vendor Advisory, Issue Tracking
CPE cpe:2.3:a:getgophish:gophish:*:*:*:*:*:*:*:*
First Time Getgophish
Getgophish gophish

06 Feb 2026, 19:16

Type Values Removed Values Added
CWE CWE-200
CWE-922
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.6

06 Feb 2026, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 18:15

Updated : 2026-02-10 18:23


NVD link : CVE-2025-70963

Mitre link : CVE-2025-70963

CVE.ORG link : CVE-2025-70963


JSON object : View

Products Affected

getgophish

  • gophish
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-922

Insecure Storage of Sensitive Information