CVE-2026-40883
goshs: CSRF in state-changing GET routes enables authenticated file deletion and directory creation
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as ?delete and ?mkdir because goshs relies on HTTP basic auth alone and performs no CSRF, Origin, or Referer validation for those routes. This vulnerability is fixed in 2.0.0-beta.6.
| CWE | CWE-352 |
| Vendor | patrickhener |
| Product | goshs |
| Published | Apr 21, 2026 |
| Last Updated | Apr 21, 2026 |
Stay Ahead of the Next One
Get instant alerts for patrickhener goshs
Be the first to know when new unknown vulnerabilities affecting patrickhener goshs are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
patrickhener / goshs
>= 2.0.0-beta.4, < 2.0.0-beta.6