CVE-2026-40189
Severity CVSS v4.0:
CRITICAL
Type:
Unavailable / Other
Publication date:
10/04/2026
Last modified:
14/04/2026
Description
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.4, goshs enforces the documented per-folder .goshs ACL/basic-auth mechanism for directory listings and file reads, but it does not enforce the same authorization checks for state-changing routes. An unauthenticated attacker can upload files with PUT, upload files with multipart POST /upload, create directories with ?mkdir, and delete files with ?delete inside a .goshs-protected directory. By deleting the .goshs file itself, the attacker can remove the folder's auth policy and then access previously protected content without credentials. This results in a critical authorization bypass affecting confidentiality, integrity, and availability. This vulnerability is fixed in 2.0.0-beta.4.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:goshs:goshs:*:*:*:*:*:go:*:* | 2.0.0 (excluding) | |
| cpe:2.3:a:goshs:goshs:2.0.0:beta1:*:*:*:go:*:* | ||
| cpe:2.3:a:goshs:goshs:2.0.0:beta2:*:*:*:go:*:* | ||
| cpe:2.3:a:goshs:goshs:2.0.0:beta3:*:*:*:go:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/patrickhener/goshs/commit/f212c4f4a126556bab008f79758e21a839ef2c0f
- https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.4
- https://github.com/patrickhener/goshs/security/advisories/GHSA-wvhv-qcqf-f3cx
- https://github.com/patrickhener/goshs/security/advisories/GHSA-wvhv-qcqf-f3cx



