GHSA-pchf-49fh-w34r

Suggest an improvement
Source
https://github.com/advisories/GHSA-pchf-49fh-w34r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-pchf-49fh-w34r/GHSA-pchf-49fh-w34r.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pchf-49fh-w34r
Aliases
Published
2026-01-21T23:02:07Z
Modified
2026-02-03T03:08:53.029033Z
Severity
  • 8.1 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
Soft Serve Affected by an Authentication Bypass
Details

Impact

What kind of vulnerability is it? Who is impacted?

This issue impacts every Soft Serve instance.

A critical authentication bypass allows an attacker to impersonate any user (including Admin) by "offering" the victim's public key during the SSH handshake before authenticating with their own valid key. This occurs because the user identity is stored in the session context during the "offer" phase and is not cleared if that specific authentication attempt fails.

Patches

Has the problem been patched? What versions should users upgrade to?

Yes, please upgrade to version 0.11.3 as soon as possible.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

You need to upgrade

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-01-21T23:02:07Z",
    "cwe_ids": [
        "CWE-289"
    ],
    "nvd_published_at": "2026-01-22T22:16:21Z",
    "severity": "HIGH"
}
References

Affected packages

Go / github.com/charmbracelet/soft-serve

Package

Name
github.com/charmbracelet/soft-serve
View open source insights on deps.dev
Purl
pkg:golang/github.com/charmbracelet/soft-serve

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.3

Database specific

last_known_affected_version_range
"<= 0.11.2"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-pchf-49fh-w34r/GHSA-pchf-49fh-w34r.json"