Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jrq5-hg6x-j6g3 | goshs has CSRF in state-changing GET routes enables authenticated file deletion and directory creation |
Mon, 27 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Goshs
Goshs goshs |
|
| CPEs | cpe:2.3:a:goshs:goshs:2.0.0:beta4:*:*:*:go:*:* cpe:2.3:a:goshs:goshs:2.0.0:beta5:*:*:*:go:*:* |
|
| Vendors & Products |
Goshs
Goshs goshs |
|
| Metrics |
cvssV3_1
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Patrickhener
Patrickhener goshs |
|
| Vendors & Products |
Patrickhener
Patrickhener goshs |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as ?delete and ?mkdir because goshs relies on HTTP basic auth alone and performs no CSRF, Origin, or Referer validation for those routes. This vulnerability is fixed in 2.0.0-beta.6. | |
| Title | goshs: CSRF in state-changing GET routes enables authenticated file deletion and directory creation | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T20:36:13.233Z
Reserved: 2026-04-15T15:57:41.719Z
Link: CVE-2026-40883
Updated: 2026-04-21T20:17:09.423Z
Status : Analyzed
Published: 2026-04-21T20:17:01.983
Modified: 2026-04-27T14:57:06.607
Link: CVE-2026-40883
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:45:27Z
Github GHSA