CVE-2026-34581: CWE-288: Authentication Bypass Using an Alternate Path or Channel in patrickhener goshs
goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. This issue has been patched in version 2.0.0-beta.2.
AI Analysis
Technical Summary
CVE-2026-34581 is an authentication bypass vulnerability classified under CWE-288, affecting goshs, a SimpleHTTPServer implemented in Go by patrickhener. The issue exists in versions from 1.1.0 up to but excluding 2.0.0-beta.2. When the Share Token feature is enabled, it is possible for an attacker to circumvent the intended limited file download restrictions. This bypass grants unauthorized access to all goshs functionalities, including the ability to execute arbitrary code remotely. The vulnerability arises due to improper validation or enforcement of access controls when using alternate paths or channels via the Share Token mechanism. The CVSS v3.1 score is 8.1 (high), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact includes full compromise of confidentiality and integrity of the server and its data, while availability remains unaffected. The flaw has been addressed in goshs version 2.0.0-beta.2, but no public exploit code or active exploitation has been reported to date. This vulnerability poses a significant risk to deployments exposing the Share Token feature, especially in environments where goshs serves sensitive files or is integrated into larger systems.
Potential Impact
The vulnerability enables attackers to bypass authentication controls and gain unauthorized access to all functionalities of goshs, including remote code execution. This can lead to full compromise of the affected server, allowing attackers to read, modify, or delete sensitive files and execute arbitrary commands. Organizations relying on goshs for file sharing or HTTP serving could suffer data breaches, intellectual property theft, or system takeover. Since the attack vector is network-based and requires no privileges, any exposed instance with Share Token enabled is at risk. The requirement for user interaction slightly reduces exploitation ease but does not eliminate risk, especially in targeted phishing or social engineering scenarios. The compromise of integrity and confidentiality can have cascading effects if goshs is part of a larger infrastructure, potentially enabling lateral movement or persistent footholds. Although availability is not directly impacted, the overall security posture and trustworthiness of affected systems are severely undermined.
Mitigation Recommendations
Immediate upgrade to goshs version 2.0.0-beta.2 or later is the primary mitigation step to address this vulnerability. Organizations should audit all deployments to identify instances running affected versions and disable or restrict the Share Token feature until patched. Implement network-level access controls such as firewalls or VPNs to limit exposure of goshs servers to trusted users only. Monitor logs for unusual access patterns related to Share Token usage and investigate any anomalies promptly. Employ multi-factor authentication and user training to reduce risks from social engineering that could facilitate user interaction required for exploitation. Consider isolating goshs instances in segmented network zones with minimal privileges to limit potential damage. Regularly review and update software dependencies and maintain an inventory of all goshs deployments to ensure timely patching. Finally, conduct penetration testing focused on authentication bypass scenarios to validate the effectiveness of mitigations.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, Netherlands, Sweden
CVE-2026-34581: CWE-288: Authentication Bypass Using an Alternate Path or Channel in patrickhener goshs
Description
goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. This issue has been patched in version 2.0.0-beta.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34581 is an authentication bypass vulnerability classified under CWE-288, affecting goshs, a SimpleHTTPServer implemented in Go by patrickhener. The issue exists in versions from 1.1.0 up to but excluding 2.0.0-beta.2. When the Share Token feature is enabled, it is possible for an attacker to circumvent the intended limited file download restrictions. This bypass grants unauthorized access to all goshs functionalities, including the ability to execute arbitrary code remotely. The vulnerability arises due to improper validation or enforcement of access controls when using alternate paths or channels via the Share Token mechanism. The CVSS v3.1 score is 8.1 (high), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact includes full compromise of confidentiality and integrity of the server and its data, while availability remains unaffected. The flaw has been addressed in goshs version 2.0.0-beta.2, but no public exploit code or active exploitation has been reported to date. This vulnerability poses a significant risk to deployments exposing the Share Token feature, especially in environments where goshs serves sensitive files or is integrated into larger systems.
Potential Impact
The vulnerability enables attackers to bypass authentication controls and gain unauthorized access to all functionalities of goshs, including remote code execution. This can lead to full compromise of the affected server, allowing attackers to read, modify, or delete sensitive files and execute arbitrary commands. Organizations relying on goshs for file sharing or HTTP serving could suffer data breaches, intellectual property theft, or system takeover. Since the attack vector is network-based and requires no privileges, any exposed instance with Share Token enabled is at risk. The requirement for user interaction slightly reduces exploitation ease but does not eliminate risk, especially in targeted phishing or social engineering scenarios. The compromise of integrity and confidentiality can have cascading effects if goshs is part of a larger infrastructure, potentially enabling lateral movement or persistent footholds. Although availability is not directly impacted, the overall security posture and trustworthiness of affected systems are severely undermined.
Mitigation Recommendations
Immediate upgrade to goshs version 2.0.0-beta.2 or later is the primary mitigation step to address this vulnerability. Organizations should audit all deployments to identify instances running affected versions and disable or restrict the Share Token feature until patched. Implement network-level access controls such as firewalls or VPNs to limit exposure of goshs servers to trusted users only. Monitor logs for unusual access patterns related to Share Token usage and investigate any anomalies promptly. Employ multi-factor authentication and user training to reduce risks from social engineering that could facilitate user interaction required for exploitation. Consider isolating goshs instances in segmented network zones with minimal privileges to limit potential damage. Regularly review and update software dependencies and maintain an inventory of all goshs deployments to ensure timely patching. Finally, conduct penetration testing focused on authentication bypass scenarios to validate the effectiveness of mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-30T16:56:30.999Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ceb81be6bfc5ba1df6de8b
Added to database: 4/2/2026, 6:40:27 PM
Last enriched: 4/2/2026, 7:36:40 PM
Last updated: 4/3/2026, 5:52:57 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.