๐Ÿ” CVE Alert

CVE-2026-40189

UNKNOWN 0.0

goshs has a file-based ACL authorization bypass in goshs state-changing routes

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
28th

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.4, goshs enforces the documented per-folder .goshs ACL/basic-auth mechanism for directory listings and file reads, but it does not enforce the same authorization checks for state-changing routes. An unauthenticated attacker can upload files with PUT, upload files with multipart POST /upload, create directories with ?mkdir, and delete files with ?delete inside a .goshs-protected directory. By deleting the .goshs file itself, the attacker can remove the folder's auth policy and then access previously protected content without credentials. This results in a critical authorization bypass affecting confidentiality, integrity, and availability. This vulnerability is fixed in 2.0.0-beta.4.

CWE CWE-862
Vendor patrickhener
Product goshs
Published Apr 10, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for patrickhener goshs

Be the first to know when new unknown vulnerabilities affecting patrickhener goshs are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

patrickhener / goshs
< 2.0.0-beta.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/patrickhener/goshs/security/advisories/GHSA-wvhv-qcqf-f3cx github.com: https://github.com/patrickhener/goshs/commit/f212c4f4a126556bab008f79758e21a839ef2c0f github.com: https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.4