CVE-2026-27589
MEDIUM WAF: Low
CVSS 6.5
Published: 2026-02-24
CWE-352
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the local caddy admin API (default listen `127.0.0.1:2019`) exposes a state-changing `POST /load` endpoint that replaces the entire running configuration. When origin enforcement is not enabled (`enforce_origin` not configured), the admin endpoint accepts cross-origin requests (e.g., from attacker-controlled web content in a victim browser) and applies an attacker-supplied JSON config. This can change the admin listener settings and alter HTTP server behavior without user intent. Version 2.11.1 contains a fix for the issue.
WAF Coverage Analysis
Cross-Site Request Forgery (CSRF)
Low WAF Coverage
OWASP: A01:2021 Broken Access Control
Affected Software
| Vendor | Product | Version |
|---|---|---|
| caddyserver | caddy | up to 2.11.1 |
References
- github.com (Release Notes)
- github.com (Exploit, Mitigation, Vendor Advisory)
- github.com (Exploit)
- github.com (Exploit, Third Party Advisory)