Description
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.
Published: 2026-04-06
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file deletion via path traversal
Action: Apply patch
AI Analysis

Impact

The vulnerability resides in the delete function of goshs, where a path traversal check is performed but the function does not return after the check, allowing selected paths to exceed the intended repository boundary. An attacker who can cause the delete routine to run with file‑system permissions can delete any file reachable by the running process, potentially impacting critical system files, credentials, or logs. The weakness aligns with CWE‑22 and is classified as a high‑severity path traversal exposing data deletion capabilities.

Affected Systems

Affected versions are the publicly available releases of the goshs project before the 2.0.0‑beta.3 update, notably 2.0.0‑beta.1 and 2.0.0‑beta.2. The remedy is to upgrade to 2.0.0‑beta.3 or later. Products are hosted by patrickhener and the Go implementation of a simple web server.

Risk and Exploitability

The assigned CVSS score of 9.8 reflects the extreme impact of the flaw. With an EPSS score below 1% and no entry in the CISA KEV catalog, the documented likelihood of widespread exploitation remains low, yet the potential damage is severe. It is inferred that the attack vector is likely remote, delivered via HTTP requests to the delete endpoint, but the description does not provide explicit evidence of a remote trigger, so the assumption remains qualified.

Generated by OpenCVE AI on April 9, 2026 at 22:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade goshs to version 2.0.0‑beta.3 or newer.
  • Verify that the update has been applied and that no delete API remains exposed.

Generated by OpenCVE AI on April 9, 2026 at 22:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6qcc-6q27-whp8 goshs: Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)
History

Thu, 09 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Goshs
Goshs goshs
CPEs cpe:2.3:a:goshs:goshs:*:*:*:*:*:go:*:*
cpe:2.3:a:goshs:goshs:2.0.0:beta1:*:*:*:go:*:*
cpe:2.3:a:goshs:goshs:2.0.0:beta2:*:*:*:go:*:*
Vendors & Products Goshs
Goshs goshs

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Patrickhener
Patrickhener goshs
Vendors & Products Patrickhener
Patrickhener goshs

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.
Title Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs
Weaknesses CWE-22
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T16:22:49.068Z

Reserved: 2026-04-02T20:49:44.453Z

Link: CVE-2026-35471

cve-icon Vulnrichment

Updated: 2026-04-07T16:22:44.564Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T22:16:23.913

Modified: 2026-04-09T21:20:35.993

Link: CVE-2026-35471

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:41:49Z

Weaknesses