Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-27588

Опубликовано: 24 фев. 2026
Источник: debian
EPSS Низкий

Описание

Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's HTTP `host` request matcher is documented as case-insensitive, but when configured with a large host list (>100 entries) it becomes case-sensitive due to an optimized matching path. An attacker can bypass host-based routing and any access controls attached to that route by changing the casing of the `Host` header. Version 2.11.1 contains a fix for the issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
caddyunfixedpackage

Примечания

  • https://github.com/caddyserver/caddy/security/advisories/GHSA-x76f-jf84-rqj8

EPSS

Процентиль: 14%
0.00044
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 1 месяца назад

Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's HTTP `host` request matcher is documented as case-insensitive, but when configured with a large host list (>100 entries) it becomes case-sensitive due to an optimized matching path. An attacker can bypass host-based routing and any access controls attached to that route by changing the casing of the `Host` header. Version 2.11.1 contains a fix for the issue.

CVSS3: 9.1
nvd
около 1 месяца назад

Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's HTTP `host` request matcher is documented as case-insensitive, but when configured with a large host list (>100 entries) it becomes case-sensitive due to an optimized matching path. An attacker can bypass host-based routing and any access controls attached to that route by changing the casing of the `Host` header. Version 2.11.1 contains a fix for the issue.

github
около 1 месяца назад

Caddy: MatchHost becomes case-sensitive for large host lists (>100), enabling host-based route/auth bypass

EPSS

Процентиль: 14%
0.00044
Низкий