Home

Description

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accepts that configuration but does not install any SFTP password handler. As a result, an unauthenticated network attacker can connect to the SFTP service and access files without a password. This vulnerability is fixed in 2.0.0-beta.6.

PUBLISHED Reserved 2026-04-15 | Published 2026-04-21 | Updated 2026-04-22 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-306: Missing Authentication for Critical Function

Product status

< 2.0.0-beta.6
affected

References

github.com/.../goshs/security/advisories/GHSA-c29w-qq4m-2gcv exploit

github.com/.../goshs/security/advisories/GHSA-c29w-qq4m-2gcv

cve.org (CVE-2026-40884)

nvd.nist.gov (CVE-2026-40884)

Download JSON