Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c29w-qq4m-2gcv | goshs has an empty-username SFTP password authentication bypass |
Mon, 27 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Goshs
Goshs goshs |
|
| CPEs | cpe:2.3:a:goshs:goshs:*:*:*:*:*:go:*:* cpe:2.3:a:goshs:goshs:2.0.0:beta1:*:*:*:go:*:* cpe:2.3:a:goshs:goshs:2.0.0:beta2:*:*:*:go:*:* cpe:2.3:a:goshs:goshs:2.0.0:beta3:*:*:*:go:*:* cpe:2.3:a:goshs:goshs:2.0.0:beta4:*:*:*:go:*:* cpe:2.3:a:goshs:goshs:2.0.0:beta5:*:*:*:go:*:* |
|
| Vendors & Products |
Goshs
Goshs goshs |
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Patrickhener
Patrickhener goshs |
|
| Vendors & Products |
Patrickhener
Patrickhener goshs |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accepts that configuration but does not install any SFTP password handler. As a result, an unauthenticated network attacker can connect to the SFTP service and access files without a password. This vulnerability is fixed in 2.0.0-beta.6. | |
| Title | goshs: Empty-username SFTP password authentication bypass in goshs | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-22T13:44:15.524Z
Reserved: 2026-04-15T15:57:41.719Z
Link: CVE-2026-40884
Updated: 2026-04-22T13:44:10.401Z
Status : Analyzed
Published: 2026-04-21T20:17:02.107
Modified: 2026-04-27T14:55:18.953
Link: CVE-2026-40884
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:45:26Z
Github GHSA