CVE-2026-40885
goshs: Public collaborator feed leaks .goshs ACL credentials and enables unauthorized access
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs leaks file-based ACL credentials through its public collaborator feed when the server is deployed without global basic auth. Requests to .goshs-protected folders are logged before authorization is enforced, and the collaborator websocket broadcasts raw request headers, including Authorization. An unauthenticated observer can capture a victim's folder-specific basic-auth header and replay it to read, upload, overwrite, and delete files inside the protected subtree. This vulnerability is fixed in 2.0.0-beta.6.
| CWE | CWE-200 |
| Vendor | patrickhener |
| Product | goshs |
| Published | Apr 21, 2026 |
| Last Updated | Apr 21, 2026 |
Stay Ahead of the Next One
Get instant alerts for patrickhener goshs
Be the first to know when new unknown vulnerabilities affecting patrickhener goshs are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
patrickhener / goshs
>= 2.0.0-beta.4, < 2.0.0-beta.6