CVE-2026-40883
HIGHgoshs: CSRF in state-changing GET routes enables authenticated file deletion and directory creation
Title source: cnaDescription
goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as ?delete and ?mkdir because goshs relies on HTTP basic auth alone and performs no CSRF, Origin, or Referer validation for those routes. This vulnerability is fixed in 2.0.0-beta.6.
Scores
CVSS v3
8.1
EPSS
0.0002
EPSS Percentile
4.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-352
Status
published
Products (2)
goshs/goshs
2.0.0 beta4 (2 CPE variants)
patrickhener/goshs
>= 2.0.0-beta.4, < 2.0.0-beta.6
Published
Apr 21, 2026
Tracked Since
Apr 22, 2026