Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

589+ Articles
117+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-35392: Critical Path Traversal in goshs Go HTTP Server
CVE-2026-35392: Critical Path Traversal in goshs Go HTTP Server

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-35392

CVE-2026-35392: Critical Path Traversal in goshs Go HTTP Server

A critical CVSS 9.8 path traversal vulnerability in goshs, a SimpleHTTPServer written in Go, allows unauthenticated attackers to write arbitrary files via the PUT upload endpoint. Fixed in version 2.0.0-beta.3.

Dylan H.

Security Team

April 7, 2026
4 min read

Affected Products

  • goshs prior to 2.0.0-beta.3

Executive Summary

A critical path traversal vulnerability (CVE-2026-35392) has been disclosed in goshs, a lightweight SimpleHTTPServer replacement written in Go. The vulnerability exists in the PUT file upload handler (httpserver/updown.go) and allows unauthenticated remote attackers to write files to arbitrary locations on the server filesystem by crafting a malicious upload path.

CVSS Score: 9.8 (Critical)

The flaw is fixed in goshs version 2.0.0-beta.3. All prior versions are affected.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-35392
CVSS Score9.8 (Critical)
TypePath Traversal (CWE-22)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Published2026-04-06
Fixed Ingoshs 2.0.0-beta.3

Affected Products

ProductAffected VersionsStatus
goshs (SimpleHTTPServer for Go)All versions prior to 2.0.0-beta.3Vulnerable
goshs 2.0.0-beta.3+2.0.0-beta.3 and laterPatched

goshs is commonly used as a drop-in development HTTP server and quick file-sharing utility. It is popular among developers and penetration testers for its ease of deployment and Go-native simplicity.


Technical Details

Root Cause

The vulnerability resides in httpserver/updown.go, which handles the HTTP PUT method for file uploads. The path provided in the PUT request URL is passed to file system operations without sanitization or normalization. This means an attacker can supply path traversal sequences such as ../../../etc/cron.d/backdoor in the request URL, causing the server to write attacker-controlled content to directories well outside the intended upload root.

Attack Chain

1. Attacker identifies an exposed goshs instance (default: TCP 8080)
2. Attacker crafts a PUT request with a path traversal payload:
     PUT /../../etc/cron.d/malicious HTTP/1.1
     Host: target:8080
     Content-Length: <n>
 
     [malicious cron payload]
3. goshs resolves the path without sanitization
4. File is written to /etc/cron.d/malicious
5. Cron executes the payload → RCE as the goshs process user

Why CVSS 9.8?

The combination of no authentication, no user interaction, network-reachable attack vector, and low complexity — combined with the potential for full file-system writes leading to code execution — produces a near-maximum CVSS base score. Any location writable by the goshs process is a potential target for code execution via cron jobs, authorized_keys injection, or web shell placement.


Impact Assessment

Impact AreaDescription
Arbitrary File WriteAttacker can write to any path accessible by the goshs process
Remote Code ExecutionFile write to cron, authorized_keys, or web root enables RCE
Data ExfiltrationAttacker may pivot to read sensitive files after establishing a foothold
PersistenceBackdoors can be written to system startup locations
Supply Chain Riskgoshs used in CI/CD and dev environments could be weaponized

Recommendations

Immediate Actions

  1. Upgrade goshs to 2.0.0-beta.3 or later — the patched release includes proper path sanitization in the PUT handler.
  2. Audit running goshs instances — identify all systems running goshs in your environment and verify the version.
  3. Disable PUT support if file upload functionality is not required.
  4. Restrict network access to goshs instances — do not expose goshs to untrusted networks.

Network-Level Mitigations

- Block external access to goshs service ports (default 8080) at perimeter firewall
- Enforce host-based firewall rules allowing only trusted source IPs
- Deploy WAF rules to detect path traversal sequences (../) in PUT requests
- Monitor for unexpected file creation events outside the intended upload directory

Detection Indicators

IndicatorDescription
PUT requests containing ../ or %2e%2ePath traversal attempt
Unexpected file creation outside upload rootSuccessful exploitation
New cron jobs or SSH authorized_keys modificationsPost-exploitation persistence
Unexpected processes spawned by cron or shellCode execution via written payload

References

  • NIST NVD — CVE-2026-35392
  • goshs GitHub Repository
#Vulnerability#CVE#Path Traversal#Go#Web Server#NVD#Security Updates

Related Articles

CVE-2026-5637: SQL Injection in projectworlds Car Rental System 1.0

A remotely exploitable SQL injection vulnerability (CVE-2026-5637) has been disclosed in projectworlds Car Rental System 1.0. The flaw exists in message_admin.php via the Message parameter, allowing unauthenticated attackers to manipulate backend database queries with a CVSS score of 7.3.

4 min read

CVE-2026-26477: DokuWiki media_upload_xhr() Denial of Service

A high-severity denial-of-service vulnerability in DokuWiki v.2025-05-14b 'Librarian' allows remote attackers to crash the application by exploiting the...

4 min read

CVE-2026-33615: Critical Unauthenticated SQL Injection in setinfo Endpoint

A critical unauthenticated SQL injection vulnerability (CVSS 9.1) in the setinfo endpoint allows remote attackers to corrupt data and cause denial of...

3 min read
Back to all Security Alerts