Embedthis Goahead
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Embedthis Goahead.
Known Exploited Embedthis Goahead Vulnerabilities
The following Embedthis Goahead vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| Embedthis GoAhead Remote Code Execution Vulnerability |
Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. CVE-2017-17562 Exploit Probability: 94.3% |
December 10, 2021 |
The vulnerability CVE-2017-17562: Embedthis GoAhead Remote Code Execution Vulnerability is in the top 1% of the currently known exploitable vulnerabilities.
By the Year
In 2026 there have been 0 vulnerabilities in Embedthis Goahead. Last year, in 2025 Goahead had 1 security vulnerability published. Right now, Goahead is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 2 | 9.80 |
| 2021 | 1 | 9.80 |
| 2020 | 1 | 8.80 |
| 2019 | 5 | 8.63 |
| 2018 | 2 | 0.00 |
It may take a day or so for new Goahead vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Embedthis Goahead Security Vulnerabilities
EmbedThis GoAhead 2.5 goform/formTest XSS via name parameter
CVE-2023-53155
- July 25, 2025
goform/formTest in EmbedThis GoAhead 2.5 allows HTML injection via the name parameter.
XSS
Nonce Entropy Weakness in GoAhead WebServer 2.1.8 (websda.c)
CVE-2021-41615
9.8 - Critical
- August 08, 2022
websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy because the nonce calculation relies on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP Digest Access Authentication in RFC 7616 section 3.3 (or RFC 2617 section 3.2.1). NOTE: 2.1.8 is a version from 2003; however, the affected websda.c code appears in multiple derivative works that may be used in 2021. Recent GoAhead software is unaffected.
Insufficient Entropy
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting
CVE-2021-43298
9.8 - Critical
- January 25, 2022
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.
Improper Restriction of Excessive Authentication Attempts
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5
CVE-2021-42342
9.8 - Critical
- October 14, 2021
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
Unrestricted File Upload
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks
CVE-2020-15688
8.8 - High
- July 23, 2020
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.
Authentication Bypass by Capture-replay
An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1
CVE-2019-5096
9.8 - Critical
- December 03, 2019
An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server.
Dangling pointer
A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1
CVE-2019-5097
7.5 - High
- December 03, 2019
A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server.
Infinite Loop
Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header
CVE-2019-19240
- November 22, 2019
Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.
An issue was discovered in Embedthis GoAhead 2.5.0
CVE-2019-16645
8.6 - High
- September 20, 2019
An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (such as goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker. This could potentially be used in a phishing attack.
Code Injection
In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1
CVE-2019-12822
- June 14, 2019
In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and potential DoS, as demonstrated by a colon on a line by itself.
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2
CVE-2018-15504
- August 18, 2018
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2
CVE-2018-15505
- August 18, 2018
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 address.
Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked
CVE-2017-17562
8.1 - High
- December 12, 2017
Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Embedthis Goahead or by Embedthis? Click the Watch button to subscribe.