High severity8.1NVD Advisory· Published Apr 21, 2026· Updated Apr 27, 2026
CVE-2026-40883
CVE-2026-40883
Description
goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as ?delete and ?mkdir because goshs relies on HTTP basic auth alone and performs no CSRF, Origin, or Referer validation for those routes. This vulnerability is fixed in 2.0.0-beta.6.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/patrickhener/goshs/v2Go | >= 2.0.0-beta.4, < 2.0.0-beta.6 | 2.0.0-beta.6 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/patrickhener/goshs/security/advisories/GHSA-jrq5-hg6x-j6g3nvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-jrq5-hg6x-j6g3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40883ghsaADVISORY
News mentions
0No linked articles in our index yet.