


Perceptive Security
SOC/SIEM Consultancy

goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited se…
Published:
1 April 2026 at 22:00:00
Alert date:
2 April 2026 at 20:02:35
Source:
nvd.nist.gov
Web Technologies, Security Tools
CVE-2026-34581 affects goshs, a SimpleHTTPServer written in Go, from version 1.1.0 to before version 2.0.0-beta.2. The vulnerability allows attackers to bypass Share Token authentication and access limited file downloads with full goshs functionality, including code execution capabilities. This authentication bypass represents a significant security risk as it can lead to unauthorized file access and remote code execution. The issue has been addressed in version 2.0.0-beta.2 with appropriate patches. Organizations using affected versions should upgrade immediately to mitigate the risk.
Technical details
Mitigation steps:
Affected products:
goshs
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34581
https://github.com/patrickhener/goshs/commit/6fb224ed15c2ccc0c61a5ebe22f2401eb06e9216
https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.2
https://github.com/patrickhener/goshs/security/advisories/GHSA-jgfx-74g2-9r6g
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
