CVE-2026-40884
goshs: Empty-username SFTP password authentication bypass in goshs
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accepts that configuration but does not install any SFTP password handler. As a result, an unauthenticated network attacker can connect to the SFTP service and access files without a password. This vulnerability is fixed in 2.0.0-beta.6.
| CWE | CWE-306 |
| Vendor | patrickhener |
| Product | goshs |
| Published | Apr 21, 2026 |
Stay Ahead of the Next One
Get instant alerts for patrickhener goshs
Be the first to know when new critical vulnerabilities affecting patrickhener goshs are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
patrickhener / goshs
< 2.0.0-beta.6