Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-40883— goshs: CSRF in state-changing GET routes enables authenticated file deletion and directory creation

EPSS 0.02% · P4
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-40883

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
goshs: CSRF in state-changing GET routes enables authenticated file deletion and directory creation
Source: NVD (National Vulnerability Database)
Vulnerability Description
goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as ?delete and ?mkdir because goshs relies on HTTP basic auth alone and performs no CSRF, Origin, or Referer validation for those routes. This vulnerability is fixed in 2.0.0-beta.6.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨站请求伪造(CSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
goshs 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
goshs是Patrick Hener个人开发者的一个用Go编写的简单HTTP Server。 goshs 2.0.0-beta.4至2.0.0-beta.5版本存在安全漏洞,该漏洞源于状态变更的HTTP GET路由缺乏CSRF、Origin或Referer验证,可能导致外部攻击者触发已认证浏览器执行破坏性操作。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
patrickhenergoshs >= 2.0.0-beta.4, < 2.0.0-beta.6 -

II. Public POCs for CVE-2026-40883

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-40883

登录查看更多情报信息。

Same Patch Batch · patrickhener · 2026-04-21 · 5 CVEs total

CVE-2026-408849.8 CRITICALgoshs: Empty-username SFTP password authentication bypass in goshs
CVE-2026-409039.1 CRITICALGoshs - ArtiPACKED Vulnerability – GitHub Actions Credential Persistence
CVE-2026-40876SFTP root escape via prefix-based path validation in goshs
CVE-2026-40885goshs: Public collaborator feed leaks .goshs ACL credentials and enables unauthorized acce

IV. Related Vulnerabilities

V. Comments for CVE-2026-40883

No comments yet


Leave a comment