๐Ÿ” CVE Alert

CVE-2026-40883

UNKNOWN 0.0

goshs: CSRF in state-changing GET routes enables authenticated file deletion and directory creation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as ?delete and ?mkdir because goshs relies on HTTP basic auth alone and performs no CSRF, Origin, or Referer validation for those routes. This vulnerability is fixed in 2.0.0-beta.6.

CWE CWE-352
Vendor patrickhener
Product goshs
Published Apr 21, 2026
Last Updated Apr 21, 2026
Stay Ahead of the Next One

Get instant alerts for patrickhener goshs

Be the first to know when new unknown vulnerabilities affecting patrickhener goshs are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

patrickhener / goshs
>= 2.0.0-beta.4, < 2.0.0-beta.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/patrickhener/goshs/security/advisories/GHSA-jrq5-hg6x-j6g3