Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34581: CWE-288: Authentication Bypass Using an Alternate Path or Channel in patrickhener goshs

0
High
VulnerabilityCVE-2026-34581cvecve-2026-34581cwe-288
Published: Thu Apr 02 2026 (04/02/2026, 18:04:35 UTC)
Source: CVE Database V5
Vendor/Project: patrickhener
Product: goshs

Description

goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. This issue has been patched in version 2.0.0-beta.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 19:36:40 UTC

Technical Analysis

CVE-2026-34581 is an authentication bypass vulnerability classified under CWE-288, affecting goshs, a SimpleHTTPServer implemented in Go by patrickhener. The issue exists in versions from 1.1.0 up to but excluding 2.0.0-beta.2. When the Share Token feature is enabled, it is possible for an attacker to circumvent the intended limited file download restrictions. This bypass grants unauthorized access to all goshs functionalities, including the ability to execute arbitrary code remotely. The vulnerability arises due to improper validation or enforcement of access controls when using alternate paths or channels via the Share Token mechanism. The CVSS v3.1 score is 8.1 (high), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact includes full compromise of confidentiality and integrity of the server and its data, while availability remains unaffected. The flaw has been addressed in goshs version 2.0.0-beta.2, but no public exploit code or active exploitation has been reported to date. This vulnerability poses a significant risk to deployments exposing the Share Token feature, especially in environments where goshs serves sensitive files or is integrated into larger systems.

Potential Impact

The vulnerability enables attackers to bypass authentication controls and gain unauthorized access to all functionalities of goshs, including remote code execution. This can lead to full compromise of the affected server, allowing attackers to read, modify, or delete sensitive files and execute arbitrary commands. Organizations relying on goshs for file sharing or HTTP serving could suffer data breaches, intellectual property theft, or system takeover. Since the attack vector is network-based and requires no privileges, any exposed instance with Share Token enabled is at risk. The requirement for user interaction slightly reduces exploitation ease but does not eliminate risk, especially in targeted phishing or social engineering scenarios. The compromise of integrity and confidentiality can have cascading effects if goshs is part of a larger infrastructure, potentially enabling lateral movement or persistent footholds. Although availability is not directly impacted, the overall security posture and trustworthiness of affected systems are severely undermined.

Mitigation Recommendations

Immediate upgrade to goshs version 2.0.0-beta.2 or later is the primary mitigation step to address this vulnerability. Organizations should audit all deployments to identify instances running affected versions and disable or restrict the Share Token feature until patched. Implement network-level access controls such as firewalls or VPNs to limit exposure of goshs servers to trusted users only. Monitor logs for unusual access patterns related to Share Token usage and investigate any anomalies promptly. Employ multi-factor authentication and user training to reduce risks from social engineering that could facilitate user interaction required for exploitation. Consider isolating goshs instances in segmented network zones with minimal privileges to limit potential damage. Regularly review and update software dependencies and maintain an inventory of all goshs deployments to ensure timely patching. Finally, conduct penetration testing focused on authentication bypass scenarios to validate the effectiveness of mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T16:56:30.999Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ceb81be6bfc5ba1df6de8b

Added to database: 4/2/2026, 6:40:27 PM

Last enriched: 4/2/2026, 7:36:40 PM

Last updated: 4/3/2026, 5:52:57 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses