CVE-2026-40883
Received Received - Intake
CSRF Vulnerability in goshs HTTP GET Routes Enables Destructive Actions

Publication date: 2026-04-21

Last updated on: 2026-04-27

Assigner: GitHub, Inc.

Description
goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as ?delete and ?mkdir because goshs relies on HTTP basic auth alone and performs no CSRF, Origin, or Referer validation for those routes. This vulnerability is fixed in 2.0.0-beta.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-21
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
goshs goshs 2.0.0
goshs goshs 2.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by verifying if the goshs server is running a vulnerable version (>= v2.0.0-beta.4 and <= v2.0.0-beta.5) and if it exposes state-changing HTTP GET routes such as ?delete and ?mkdir without CSRF protections.

One way to detect exploitation attempts is to monitor HTTP GET requests to these specific routes that perform destructive actions.

Suggested commands to verify the vulnerability and its exploitation include:

  • Check the goshs version to confirm if it is within the vulnerable range.
  • Use curl or similar tools to test the vulnerable endpoints, for example:
  • curl -u username:password "http://<goshs-server-address>/victim.txt?delete"
  • curl -u username:password "http://<goshs-server-address>/csrfmade?mkdir"

If these commands succeed in deleting files or creating directories, the server is vulnerable.

Additionally, monitoring logs for unexpected GET requests with these query parameters and checking for unauthorized filesystem changes can help detect exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an attacker to perform unauthorized filesystem modifications such as deleting files and creating directories by exploiting cross-site request forgery (CSRF) in goshs. This can lead to high impact on integrity and availability of the system.

While the CVE description does not explicitly mention compliance with standards like GDPR or HIPAA, the unauthorized modification or deletion of files could potentially lead to violations of data integrity and availability requirements mandated by such regulations.

Organizations relying on goshs without proper CSRF protections and using only HTTP Basic Authentication may face risks related to unauthorized data manipulation, which could affect compliance with regulations that require safeguarding data integrity and availability.


How can this vulnerability impact me? :

This vulnerability allows an attacker to leverage an authenticated victim’s browser to perform unauthorized filesystem changes on the goshs server.

  • Delete files on the server (e.g., removing important data).
  • Create new directories, potentially disrupting server operations or causing confusion.

Such unauthorized modifications can lead to high impact on the integrity and availability of the server's filesystem, potentially disrupting services or causing data loss.


Can you explain this vulnerability to me?

CVE-2026-40883 is a Cross-Site Request Forgery (CSRF) vulnerability in the Go-based web server "goshs" versions 2.0.0-beta.4 to 2.0.0-beta.5. The issue occurs because goshs uses HTTP GET routes for state-changing operations like file deletion (?delete) and directory creation (?mkdir), relying only on HTTP Basic Authentication without any CSRF, Origin, or Referer header validation.

An attacker can craft malicious web pages that cause an authenticated victim's browser to automatically send requests to the goshs server, triggering unauthorized file deletions and directory creations without the victim's knowledge or consent.

This happens because browsers automatically include cached HTTP Basic Auth credentials with subresource requests, allowing the attacker to exploit the lack of CSRF protections.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Upgrade goshs to version 2.0.0-beta.6 or later, where this vulnerability is fixed.
  • Avoid using HTTP GET requests for state-changing operations such as file deletion and directory creation.
  • Implement CSRF protections, including per-request CSRF tokens and strict validation of Origin and Referer headers.
  • Treat all rendered HTML content as untrusted and isolate it from issuing authenticated same-origin requests.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart