VYPR
High severity8.8NVD Advisory· Published Apr 21, 2026· Updated Apr 27, 2026

CVE-2026-40885

CVE-2026-40885

Description

goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs leaks file-based ACL credentials through its public collaborator feed when the server is deployed without global basic auth. Requests to .goshs-protected folders are logged before authorization is enforced, and the collaborator websocket broadcasts raw request headers, including Authorization. An unauthenticated observer can capture a victim's folder-specific basic-auth header and replay it to read, upload, overwrite, and delete files inside the protected subtree. This vulnerability is fixed in 2.0.0-beta.6.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/patrickhener/goshs/v2Go
>= 2.0.0-beta.4, < 2.0.0-beta.62.0.0-beta.6

Affected products

2
  • Goshs/Goshs2 versions
    cpe:2.3:a:goshs:goshs:2.0.0:beta4:*:*:*:go:*:*+ 1 more
    • cpe:2.3:a:goshs:goshs:2.0.0:beta4:*:*:*:go:*:*
    • cpe:2.3:a:goshs:goshs:2.0.0:beta5:*:*:*:go:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.