Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jg56-wf8x-qrv5 | goshs: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs POST multipart upload |
Thu, 09 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Goshs
Goshs goshs |
|
| CPEs | cpe:2.3:a:goshs:goshs:*:*:*:*:*:go:*:* cpe:2.3:a:goshs:goshs:2.0.0:beta1:*:*:*:go:*:* cpe:2.3:a:goshs:goshs:2.0.0:beta2:*:*:*:go:*:* |
|
| Vendors & Products |
Goshs
Goshs goshs |
Wed, 08 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Patrickhener
Patrickhener goshs |
|
| Vendors & Products |
Patrickhener
Patrickhener goshs |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, the POST multipart upload directory not sanitized. This vulnerability is fixed in 2.0.0-beta.3. | |
| Title | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs POST multipart upload | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T13:58:10.369Z
Reserved: 2026-04-02T17:03:42.074Z
Link: CVE-2026-35393
Updated: 2026-04-08T13:58:04.726Z
Status : Analyzed
Published: 2026-04-06T21:16:21.163
Modified: 2026-04-09T21:20:27.383
Link: CVE-2026-35393
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:45:02Z
Github GHSA