CVE-2026-4660

| EUVD-2026-20894 HIGH
2026-04-09 HashiCorp GHSA-92mm-2pjq-r785
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

4
Patch Released
Apr 10, 2026 - 20:30 nvd
Patch available
Analysis Generated
Apr 09, 2026 - 14:15 vuln.today
EUVD ID Assigned
Apr 09, 2026 - 14:15 euvd
EUVD-2026-20894
CVE Published
Apr 09, 2026 - 13:47 nvd
HIGH 7.5

Description

HashiCorp’s go-getter library up to v1.8.5 may allow arbitrary file reads on the file system during certain git operations through a maliciously crafted URL. This vulnerability, CVE-2026-4660, is fixed in go-getter v1.8.6. This vulnerability does not affect the go-getter/v2 branch and package.

Analysis

Arbitrary file read vulnerability in HashiCorp go-getter library versions up to 1.8.5 enables unauthenticated remote attackers to access sensitive files from the target filesystem through specially crafted git operation URLs. The vulnerability permits confidentiality breach without authentication requirements, affecting network-accessible services utilizing the library for repository cloning or fetching operations. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all systems running HashiCorp go-getter v1.8.5 and earlier by auditing dependency manifests in Terraform configurations, HashiCorp product installations, and custom applications using the library; disable or restrict network access to affected services pending patch deployment. Within 7 days: Apply vendor-released patch version 1.8.6 or upgrade to go-getter/v2 branch; validate patching across all production and staging environments. …

Sign in for detailed remediation steps.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2026-4660 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy