CVE-2026-42091 — Arbitrary File Access
CVE-2026-42091 — goshs is a SimpleHTTPServer written in Go. Prior to version 2.0.2, the PUT upload handler (httpserver/updown.go) lacks the CSRF token validation that was added to the POST upload handler during the CVE-2026-40883 fix. Combined with the unconditional Access-Control-Allow-Origin: * on
What This Means For You
- If your environment is affected by CWE-352, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-42091 updates and patches.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-42091 - goshs Arbitrary File Write via PUT
title: CVE-2026-42091 - goshs Arbitrary File Write via PUT
id: scw-2026-05-04-ai-1
status: experimental
level: critical
description: |
Detects the use of the HTTP PUT method on the root path ('/') of a goshs server, which is indicative of the arbitrary file write vulnerability exploited in CVE-2026-42091. This bypasses network isolation by allowing an attacker-controlled website to write files to a goshs instance via a victim's browser.
author: SCW Feed Engine (AI-generated)
date: 2026-05-04
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-42091/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-method:
- 'PUT'
cs-uri:
- '/'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-42091 | vulnerability | CVE-2026-42091 |
| CWE-352 | weakness | CWE-352 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 04, 2026 at 21:16 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.