CVE-2026-40883

HIGH

goshs: CSRF in state-changing GET routes enables authenticated file deletion and directory creation

Title source: cna
STIX 2.1

Description

goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as ?delete and ?mkdir because goshs relies on HTTP basic auth alone and performs no CSRF, Origin, or Referer validation for those routes. This vulnerability is fixed in 2.0.0-beta.6.

Scores

CVSS v3 8.1
EPSS 0.0002
EPSS Percentile 4.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-352
Status published
Products (2)
goshs/goshs 2.0.0 beta4 (2 CPE variants)
patrickhener/goshs >= 2.0.0-beta.4, < 2.0.0-beta.6
Published Apr 21, 2026
Tracked Since Apr 22, 2026