{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-34581","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-30T16:56:30.999Z","datePublished":"2026-04-02T18:04:35.217Z","dateUpdated":"2026-04-03T17:01:54.432Z"},"containers":{"cna":{"title":"goshs has Auth Bypass via Share Token","problemTypes":[{"descriptions":[{"cweId":"CWE-288","lang":"en","description":"CWE-288: Authentication Bypass Using an Alternate Path or Channel","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/patrickhener/goshs/security/advisories/GHSA-jgfx-74g2-9r6g","tags":["x_refsource_CONFIRM"],"url":"https://github.com/patrickhener/goshs/security/advisories/GHSA-jgfx-74g2-9r6g"},{"name":"https://github.com/patrickhener/goshs/commit/6fb224ed15c2ccc0c61a5ebe22f2401eb06e9216","tags":["x_refsource_MISC"],"url":"https://github.com/patrickhener/goshs/commit/6fb224ed15c2ccc0c61a5ebe22f2401eb06e9216"},{"name":"https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.2","tags":["x_refsource_MISC"],"url":"https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.2"}],"affected":[{"vendor":"patrickhener","product":"goshs","versions":[{"version":">= 1.1.0, < 2.0.0-beta.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-04-02T18:04:35.217Z"},"descriptions":[{"lang":"en","value":"goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. This issue has been patched in version 2.0.0-beta.2."}],"source":{"advisory":"GHSA-jgfx-74g2-9r6g","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-03T16:19:09.570992Z","id":"CVE-2026-34581","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-03T17:01:54.432Z"}}]}}