๐Ÿ” CVE Alert

CVE-2026-27589

UNKNOWN 0.0

Caddy vulnerable to cross-origin config application via local admin API /load (caddy)

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the local caddy admin API (default listen `127.0.0.1:2019`) exposes a state-changing `POST /load` endpoint that replaces the entire running configuration. When origin enforcement is not enabled (`enforce_origin` not configured), the admin endpoint accepts cross-origin requests (e.g., from attacker-controlled web content in a victim browser) and applies an attacker-supplied JSON config. This can change the admin listener settings and alter HTTP server behavior without user intent. Version 2.11.1 contains a fix for the issue.

CWE CWE-352
Vendor caddyserver
Product caddy
Published Feb 24, 2026
Last Updated Feb 27, 2026
Stay Ahead of the Next One

Get instant alerts for caddyserver caddy

Be the first to know when new unknown vulnerabilities affecting caddyserver caddy are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

caddyserver / caddy
< 2.11.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/caddyserver/caddy/security/advisories/GHSA-879p-475x-rqh2 github.com: https://github.com/caddyserver/caddy/releases/tag/v2.11.1 github.com: https://github.com/user-attachments/files/25079818/poc.zip github.com: https://github.com/user-attachments/files/25079820/PR_DESCRIPTION.md