Description
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs has an ArtiPACKED vulnerability. ArtiPACKED can lead to leakage of the GITHUB_TOKEN through workflow artifacts, even though the token is not present in the repository source code. This vulnerability is fixed in 2.0.0-beta.6.
Published: 2026-04-21
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Credential Leakage
Action: Apply Patch
AI Analysis

Impact

goshs, a lightweight HTTP server written in Go, contains an ArtiPACKED vulnerability in releases before 2.0.0‑beta.6 that can cause the server to embed the environment variable GITHUB_TOKEN into data written to workflow artifacts. If a malicious or compromised GitHub Actions workflow triggers artifact creation, the token can be downloaded by the attacker, granting authenticated access to the repository and related services. The CVSS score of 9.1 reflects a high likelihood of serious impact because the exposed credential can be used for extensive malicious actions. The likely attack vector is a workflow that writes the token to an artifact, even though the token is not present in the repository source code.

Affected Systems

The vulnerability affects the SimpleHTTPServer package maintained by Patrick Hener, impacting all releases prior to 2.0.0‑beta.6. Administrators who run goshs in CI/CD contexts or expose the server to untrusted inputs should note that unpatched instances are vulnerable to credential leakage via GitHub Actions artifacts.

Risk and Exploitability

The CVSS base score of 9.1 indicates high severity, and although the EPSS score is not available, the vulnerability is not yet listed in the CISA KEV catalog. However, the flaw is trivial to exploit when a workflow generates artifacts, and a compromised GITHUB_TOKEN can enable a wide range of malicious actions. Given its high score and potential impact, this threat should be treated with urgency. The absence of an EPSS score does not reduce the likelihood that an attacker could abuse the flaw in environments where workflow artifact uploads are automated.

Generated by OpenCVE AI on April 22, 2026 at 05:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade goshs to version 2.0.0‑beta.6 or later.
  • Modify GitHub Actions workflows so that artifacts do not contain the GITHUB_TOKEN, or set artifact retention to the minimum required and delete them immediately after use.
  • Revoke any GitHub tokens that may have been exposed through this vulnerability and generate new personal access tokens for the affected repositories.
  • Monitor GitHub audit logs for suspicious token usage and review workflow executions for content that includes credential tokens.

Generated by OpenCVE AI on April 22, 2026 at 05:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Patrickhener
Patrickhener goshs
Vendors & Products Patrickhener
Patrickhener goshs

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs has an ArtiPACKED vulnerability. ArtiPACKED can lead to leakage of the GITHUB_TOKEN through workflow artifacts, even though the token is not present in the repository source code. This vulnerability is fixed in 2.0.0-beta.6.
Title Goshs - ArtiPACKED Vulnerability – GitHub Actions Credential Persistence
Weaknesses CWE-829
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Patrickhener Goshs
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-22T13:45:41.782Z

Reserved: 2026-04-15T16:37:22.767Z

Link: CVE-2026-40903

cve-icon Vulnrichment

Updated: 2026-04-22T13:45:38.058Z

cve-icon NVD

Status : Received

Published: 2026-04-21T20:17:02.947

Modified: 2026-04-21T20:17:02.947

Link: CVE-2026-40903

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:45:22Z

Weaknesses