Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-40885— goshs: Public collaborator feed leaks .goshs ACL credentials and enables unauthorized access

EPSS 0.06% · P20
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-40885

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
goshs: Public collaborator feed leaks .goshs ACL credentials and enables unauthorized access
Source: NVD (National Vulnerability Database)
Vulnerability Description
goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs leaks file-based ACL credentials through its public collaborator feed when the server is deployed without global basic auth. Requests to .goshs-protected folders are logged before authorization is enforced, and the collaborator websocket broadcasts raw request headers, including Authorization. An unauthenticated observer can capture a victim's folder-specific basic-auth header and replay it to read, upload, overwrite, and delete files inside the protected subtree. This vulnerability is fixed in 2.0.0-beta.6.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
goshs 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
goshs是Patrick Hener个人开发者的一个用Go编写的简单HTTP Server。 goshs 2.0.0-beta.4至2.0.0-beta.5版本存在安全漏洞,该漏洞源于在未部署全局基本身份验证时,协作WebSocket广播原始请求标头,可能导致未经身份验证的观察者捕获并重放受害者特定文件夹的基本身份验证标头。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
patrickhenergoshs >= 2.0.0-beta.4, < 2.0.0-beta.6 -

II. Public POCs for CVE-2026-40885

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-40885

登录查看更多情报信息。

Same Patch Batch · patrickhener · 2026-04-21 · 5 CVEs total

CVE-2026-408849.8 CRITICALgoshs: Empty-username SFTP password authentication bypass in goshs
CVE-2026-409039.1 CRITICALGoshs - ArtiPACKED Vulnerability – GitHub Actions Credential Persistence
CVE-2026-40876SFTP root escape via prefix-based path validation in goshs
CVE-2026-40883goshs: CSRF in state-changing GET routes enables authenticated file deletion and directory

IV. Related Vulnerabilities

V. Comments for CVE-2026-40885

No comments yet


Leave a comment