VYPR
High severity8.1NVD Advisory· Published Apr 21, 2026· Updated Apr 27, 2026

CVE-2026-40883

CVE-2026-40883

Description

goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as ?delete and ?mkdir because goshs relies on HTTP basic auth alone and performs no CSRF, Origin, or Referer validation for those routes. This vulnerability is fixed in 2.0.0-beta.6.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/patrickhener/goshs/v2Go
>= 2.0.0-beta.4, < 2.0.0-beta.62.0.0-beta.6

Affected products

2
  • Goshs/Goshs2 versions
    cpe:2.3:a:goshs:goshs:2.0.0:beta4:*:*:*:go:*:*+ 1 more
    • cpe:2.3:a:goshs:goshs:2.0.0:beta4:*:*:*:go:*:*
    • cpe:2.3:a:goshs:goshs:2.0.0:beta5:*:*:*:go:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.