top of page
perceptive_background_267k.jpg

goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited se…

Published:

1 april 2026 om 22:00:00

Alert date:

2 april 2026 om 20:02:35

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Security Tools

CVE-2026-34581 affects goshs, a SimpleHTTPServer written in Go, from version 1.1.0 to before version 2.0.0-beta.2. The vulnerability allows attackers to bypass Share Token authentication and access limited file downloads with full goshs functionality, including code execution capabilities. This authentication bypass represents a significant security risk as it can lead to unauthorized file access and remote code execution. The issue has been addressed in version 2.0.0-beta.2 with appropriate patches. Organizations using affected versions should upgrade immediately to mitigate the risk.

Technical details

Mitigation steps:

Affected products:

goshs

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page