CVE-2026-40885

HIGH

goshs: Public collaborator feed leaks .goshs ACL credentials and enables unauthorized access

Title source: cna
STIX 2.1

Description

goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs leaks file-based ACL credentials through its public collaborator feed when the server is deployed without global basic auth. Requests to .goshs-protected folders are logged before authorization is enforced, and the collaborator websocket broadcasts raw request headers, including Authorization. An unauthenticated observer can capture a victim's folder-specific basic-auth header and replay it to read, upload, overwrite, and delete files inside the protected subtree. This vulnerability is fixed in 2.0.0-beta.6.

Scores

CVSS v3 8.8
EPSS 0.0006
EPSS Percentile 19.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-200
Status published
Products (2)
goshs/goshs 2.0.0 beta4 (2 CPE variants)
patrickhener/goshs >= 2.0.0-beta.4, < 2.0.0-beta.6
Published Apr 21, 2026
Tracked Since Apr 22, 2026