Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. This makes permanent API credentials accessible to any script running in the browser context.
References
| Link | Resource |
|---|---|
| https://github.com/gophish/gophish/issues/9366 | Exploit Vendor Advisory Issue Tracking |
Configurations
History
10 Feb 2026, 18:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/gophish/gophish/issues/9366 - Exploit, Vendor Advisory, Issue Tracking | |
| CPE | cpe:2.3:a:getgophish:gophish:*:*:*:*:*:*:*:* | |
| First Time |
Getgophish
Getgophish gophish |
06 Feb 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-200 CWE-922 |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.6 |
06 Feb 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 18:15
Updated : 2026-02-10 18:23
NVD link : CVE-2025-70963
Mitre link : CVE-2025-70963
CVE.ORG link : CVE-2025-70963
JSON object : View
Products Affected
getgophish
- gophish
