The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-4660

CVE-2026-4660: HashiCorp go-getter Information Disclosure

CVE-2026-4660 is an information disclosure flaw in HashiCorp's go-getter library that enables arbitrary file reads through malicious git URLs. This article covers the technical details, affected versions, and mitigation.

Published: April 9, 2026

CVE-2026-4660 Overview

HashiCorp's go-getter library up to version v1.8.5 contains an information exposure vulnerability that may allow arbitrary file reads on the file system during certain git operations through a maliciously crafted URL. This vulnerability enables attackers to read sensitive files from the system without proper authorization, potentially exposing configuration files, credentials, and other confidential data.

Critical Impact

Attackers can leverage maliciously crafted URLs during git operations to read arbitrary files from the filesystem, potentially exposing sensitive configuration data, secrets, and credentials stored on affected systems.

Affected Products

  • HashiCorp go-getter library versions up to and including v1.8.5
  • Applications and infrastructure tools that depend on the vulnerable go-getter v1 branch
  • HashiCorp products utilizing the affected go-getter library versions

Discovery Timeline

  • 2026-04-09 - CVE-2026-4660 published to NVD
  • 2026-04-09 - Last updated in NVD database

Technical Details for CVE-2026-4660

Vulnerability Analysis

This vulnerability is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The go-getter library is widely used within the HashiCorp ecosystem and by various third-party applications for downloading files and modules from various sources, including git repositories. The vulnerability specifically manifests during git operations when processing URLs.

When a maliciously crafted URL is passed to the go-getter library during git operations, the library fails to properly validate and sanitize the input, allowing an attacker to traverse the filesystem and read arbitrary files. This is particularly dangerous in environments where go-getter processes untrusted user input or external configuration data.

Root Cause

The root cause stems from insufficient input validation in the URL parsing and handling logic within the go-getter library's git getter implementation. When processing git URLs, the library does not adequately sanitize path components, allowing path traversal sequences or specially crafted URL schemes to escape the intended directory scope and access arbitrary files on the filesystem.

Attack Vector

The attack can be executed remotely over the network without requiring authentication or user interaction. An attacker needs to supply a maliciously crafted URL to an application or service that uses the vulnerable go-getter library for git operations. This could occur in various scenarios:

The attacker crafts a malicious URL that exploits the path handling weakness in go-getter's git operations. When an application using the vulnerable library attempts to fetch resources using this URL, the library inadvertently reads files from outside the intended directory scope. The attack requires network access to deliver the malicious URL to a vulnerable application, but does not require any privileges on the target system.

For detailed technical information about the vulnerability mechanism, refer to the HashiCorp Security Advisory HCSEC-2026-04.

Detection Methods for CVE-2026-4660

Indicators of Compromise

  • Unusual file access patterns in application logs, particularly reads of system files like /etc/passwd, /etc/shadow, or application configuration files
  • Git operations with suspicious or malformed URLs containing path traversal sequences
  • Error messages indicating failed attempts to access files outside expected directories
  • Application crashes or unexpected behavior during git-based fetch operations

Detection Strategies

  • Monitor application logs for git operations with unusual URL patterns or path traversal attempts
  • Implement file integrity monitoring on sensitive configuration files and directories
  • Deploy network intrusion detection rules to identify malicious URL patterns targeting go-getter
  • Audit dependency versions across your infrastructure to identify applications using vulnerable go-getter versions

Monitoring Recommendations

  • Enable verbose logging for applications using go-getter to capture detailed information about file operations
  • Set up alerts for access attempts on sensitive system files from application contexts
  • Implement centralized log collection to correlate potential exploitation attempts across multiple systems
  • Monitor for unusual outbound data transfers that could indicate successful file exfiltration

How to Mitigate CVE-2026-4660

Immediate Actions Required

  • Upgrade go-getter to version v1.8.6 or later immediately across all affected applications
  • Consider migrating to the go-getter/v2 branch which is not affected by this vulnerability
  • Audit all applications and infrastructure components that depend on go-getter to identify vulnerable instances
  • Review and restrict file system permissions for applications using go-getter to limit potential exposure

Patch Information

HashiCorp has released go-getter version v1.8.6 which addresses this vulnerability. The fix implements proper validation and sanitization of URLs during git operations to prevent path traversal and arbitrary file access. Organizations should update their go-getter dependency to this version or later. Note that the go-getter/v2 branch and package are not affected by this vulnerability.

For complete patch details, see the HashiCorp Security Advisory HCSEC-2026-04.

Workarounds

  • Implement strict input validation on any URLs passed to go-getter before processing
  • Use network segmentation to limit the attack surface of applications using go-getter
  • Deploy application-level firewalls or WAF rules to filter malicious URL patterns
  • Run applications using go-getter with minimal filesystem permissions using principle of least privilege
bash
# Update go-getter dependency to patched version
go get github.com/hashicorp/go-getter@v1.8.6

# Verify the updated version
go list -m github.com/hashicorp/go-getter

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechGo Getter

  • SeverityHIGH

  • CVSS Score7.5

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-200
  • Technical References
  • HashiCorp Security Advisory HCSEC-2026-04
  • Latest CVEs
  • CVE-2025-52479: HTTP.jl & URIs.jl CRLF Injection Flaw

  • CVE-2026-31740: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31743: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31744: Linux Kernel NULL Pointer Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English