CVE-2026-40903
Published: 21 April 2026
Summary
CVE-2026-40903 is a critical-severity Inclusion of Functionality from Untrusted Control Sphere (CWE-829) vulnerability in Goshs Goshs. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2026-40903 by requiring timely patching of the ArtiPACKED vulnerability in goshs versions prior to 2.0.0-beta.6.
Enables proactive detection of vulnerable goshs instances through vulnerability scanning for CVEs like CVE-2026-40903.
Monitors for unauthorized disclosure of sensitive information such as GITHUB_TOKEN leaked via vulnerable goshs workflow artifacts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public-facing goshs server enables remote unauthenticated exploitation to extract GITHUB_TOKEN from artifacts, directly mapping to T1190 (Exploit Public-Facing Application) and T1528 (Steal Application Access Token).
NVD Description
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs has an ArtiPACKED vulnerability. ArtiPACKED can lead to leakage of the GITHUB_TOKEN through workflow artifacts, even though the token is not present in the repository source code. This vulnerability…
more
is fixed in 2.0.0-beta.6.
Deeper analysisAI
CVE-2026-40903 is an ArtiPACKED vulnerability (CWE-829) affecting goshs, a SimpleHTTPServer implementation written in Go. Versions prior to 2.0.0-beta.6 are vulnerable, where the issue enables the leakage of the GITHUB_TOKEN through GitHub Actions workflow artifacts, despite the token not being present in the repository source code. The vulnerability carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high severity due to its network-accessible nature, low attack complexity, and lack of prerequisites for exploitation.
Any unauthenticated attacker with network access to a vulnerable goshs instance can exploit this flaw without user interaction or privileges. Successful exploitation allows the attacker to extract sensitive GITHUB_TOKEN credentials embedded in workflow artifacts, potentially granting unauthorized access to the associated GitHub repository, workflows, or dependent resources for actions like code modification or further privilege escalation.
The GitHub security advisory at https://github.com/patrickhener/goshs/security/advisories/GHSA-hpxj-9fgp-fhhf confirms the vulnerability and states that it is fixed in version 2.0.0-beta.6, recommending immediate upgrades to mitigate the risk of token leakage.
Details
- CWE(s)