CVE-2026-27585 — Improper Input Validation in Caddy
Severity
6.9MEDIUMNVD
EPSS
0.1%
top 65.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 24
Latest updateFeb 26
Description
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the path sanitization routine in file matcher doesn't sanitize backslashes which can lead to bypassing path related security protections. It affects users with specific Caddy and environment configurations. Version 2.11.1 fixes the issue.
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Packages3 packages
🔴Vulnerability Details
5GHSA▶
Caddy: Improper sanitization of glob characters in file matcher may lead to bypassing security protections↗2026-02-24
OSV▶
Caddy: Improper sanitization of glob characters in file matcher may lead to bypassing security protections↗2026-02-24
CVEList▶
Caddy's improper sanitization of glob characters in file matcher may lead to bypassing security protections↗2026-02-24
📋Vendor Advisories
1Debian▶
CVE-2026-27585: caddy - Caddy is an extensible server platform that uses TLS by default. Prior to versio...↗2026