CVE-2026-40883 PUBLISHED

goshs: CSRF in state-changing GET routes enables authenticated file deletion and directory creation

Assigner: GitHub_M
Reserved: 15.04.2026 Published: 21.04.2026 Updated: 21.04.2026

goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as ?delete and ?mkdir because goshs relies on HTTP basic auth alone and performs no CSRF, Origin, or Referer validation for those routes. This vulnerability is fixed in 2.0.0-beta.6.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 6.1

Product Status

Vendor patrickhener
Product goshs
Versions
  • Version >= 2.0.0-beta.4, < 2.0.0-beta.6 is affected

References

Problem Types

  • CWE-352: Cross-Site Request Forgery (CSRF) CWE