CVE-2026-40885
Description
goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs leaks file-based ACL credentials through its public collaborator feed when the server is deployed without global basic auth. Requests to .goshs-protected folders are logged before authorization is enforced, and the collaborator websocket broadcasts raw request headers, including Authorization. An unauthenticated observer can capture a victim's folder-specific basic-auth header and replay it to read, upload, overwrite, and delete files inside the protected subtree. This vulnerability is fixed in 2.0.0-beta.6.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/patrickhener/goshs/v2Go | >= 2.0.0-beta.4, < 2.0.0-beta.6 | 2.0.0-beta.6 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/patrickhener/goshs/security/advisories/GHSA-7h3j-592v-jcrpnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-7h3j-592v-jcrpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40885ghsaADVISORY
News mentions
0No linked articles in our index yet.