{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-40884","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-04-15T15:57:41.719Z","datePublished":"2026-04-21T19:39:25.698Z","dateUpdated":"2026-04-22T13:44:15.524Z"},"containers":{"cna":{"title":"goshs: Empty-username SFTP password authentication bypass in goshs","problemTypes":[{"descriptions":[{"cweId":"CWE-306","lang":"en","description":"CWE-306: Missing Authentication for Critical Function","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/patrickhener/goshs/security/advisories/GHSA-c29w-qq4m-2gcv","tags":["x_refsource_CONFIRM"],"url":"https://github.com/patrickhener/goshs/security/advisories/GHSA-c29w-qq4m-2gcv"}],"affected":[{"vendor":"patrickhener","product":"goshs","versions":[{"version":"< 2.0.0-beta.6","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-04-21T19:39:25.698Z"},"descriptions":[{"lang":"en","value":"goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accepts that configuration but does not install any SFTP password handler. As a result, an unauthenticated network attacker can connect to the SFTP service and access files without a password. This vulnerability is fixed in 2.0.0-beta.6."}],"source":{"advisory":"GHSA-c29w-qq4m-2gcv","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/patrickhener/goshs/security/advisories/GHSA-c29w-qq4m-2gcv","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-22T13:43:56.178845Z","id":"CVE-2026-40884","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-22T13:44:15.524Z"}}]}}