CVE-2026-40903
GitHub · goshs
The goshs SimpleHTTPServer is affected by an ArtiPACKED vulnerability that can lead to the unauthorized leakage of GITHUB_TOKEN credentials via workflow artifacts.
Executive summary
A credential leakage vulnerability in goshs allows unauthorized access to sensitive GITHUB_TOKEN credentials through workflow artifacts.
Vulnerability
The "ArtiPACKED" vulnerability allows for the inadvertent exposure of sensitive environment tokens, even if those tokens are not explicitly stored in the source code repository.
Business impact
Leakage of the GITHUB_TOKEN can provide attackers with unauthorized access to private repositories, workflow secrets, and deployment environments. Given the CVSS score of 9.1, this vulnerability poses a significant risk to the entire software supply chain and organizational development security.
Remediation
Immediate Action: Upgrade goshs to version 2.0.0-beta.6 or later and immediately rotate any GITHUB_TOKENs that were accessible by the affected versions.
Proactive Monitoring: Audit CI/CD logs for unauthorized access and review artifact storage for potential data leakage.
Compensating Controls: Implement strict permissions on repository artifacts and enforce the use of short-lived tokens where possible.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
Security teams must treat this as a high-priority incident. Beyond applying the software update, it is critical to assume that existing tokens may have been compromised and to perform a full credential rotation across all affected workflows.