CVE-2026-30851
- EPSS 0.02%
- Veröffentlicht 07.03.2026 16:28:37
- Zuletzt bearbeitet 11.03.2026 13:06:25
Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has been...
CVE-2026-30852
- EPSS 0.04%
- Veröffentlicht 07.03.2026 16:28:26
- Zuletzt bearbeitet 11.03.2026 13:01:46
Caddy is an extensible server platform that uses TLS by default. From version 2.7.5 to before version 2.11.2, the vars_regexp matcher in vars.go:337 double-expands user-controlled input through the Caddy replacer. When vars_regexp matches against a p...
CVE-2026-27590
- EPSS 0.29%
- Veröffentlicht 24.02.2026 16:33:41
- Zuletzt bearbeitet 25.02.2026 17:07:09
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's FastCGI path splitting logic computes the split index on a lowercased copy of the request path and then uses that byte index to slice the original path....
CVE-2026-27589
- EPSS 0.02%
- Veröffentlicht 24.02.2026 16:30:52
- Zuletzt bearbeitet 25.02.2026 17:08:56
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the local caddy admin API (default listen `127.0.0.1:2019`) exposes a state-changing `POST /load` endpoint that replaces the entire running configuration. When ...
CVE-2026-27588
- EPSS 0.06%
- Veröffentlicht 24.02.2026 16:28:28
- Zuletzt bearbeitet 25.02.2026 17:10:48
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's HTTP `host` request matcher is documented as case-insensitive, but when configured with a large host list (>100 entries) it becomes case-sensitive due t...
CVE-2026-27587
- EPSS 0.06%
- Veröffentlicht 24.02.2026 16:26:40
- Zuletzt bearbeitet 25.02.2026 17:11:25
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's HTTP `path` request matcher is intended to be case-insensitive, but when the match pattern contains percent-escape sequences (`%xx`) it compares against...
CVE-2026-27586
- EPSS 0.12%
- Veröffentlicht 24.02.2026 16:08:20
- Zuletzt bearbeitet 25.02.2026 17:14:19
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, two swallowed errors in `ClientAuthentication.provision()` cause mTLS client certificate authentication to silently fail open when a CA certificate file is miss...
CVE-2026-27585
- EPSS 0.14%
- Veröffentlicht 24.02.2026 16:06:05
- Zuletzt bearbeitet 25.02.2026 17:13:16
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the path sanitization routine in file matcher doesn't sanitize backslashes which can lead to bypassing path related security protections. It affects users with ...
CVE-2023-50463
- EPSS 0.09%
- Veröffentlicht 10.12.2023 23:15:07
- Zuletzt bearbeitet 21.11.2024 08:37:02
The caddy-geo-ip (aka GeoIP) middleware through 0.6.0 for Caddy 2, when trust_header X-Forwarded-For is used, allows attackers to spoof their source IP address via an X-Forwarded-For header, which may bypass a protection mechanism (trusted_proxy dire...
CVE-2023-44487
- EPSS 94.39%
- Veröffentlicht 10.10.2023 14:15:10
- Zuletzt bearbeitet 07.11.2025 19:00:41
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.