CVE-2026-27589 — Cross-Site Request Forgery in Caddy
Severity
6.9MEDIUMNVD
EPSS
0.0%
top 93.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 24
Latest updateFeb 26
Description
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the local caddy admin API (default listen `127.0.0.1:2019`) exposes a state-changing `POST /load` endpoint that replaces the entire running configuration. When origin enforcement is not enabled (`enforce_origin` not configured), the admin endpoint accepts cross-origin requests (e.g., from attacker-controlled web content in a victim browser) and applies an attacker-supplied JSON config. This can change the a…
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Affected Packages3 packages
🔴Vulnerability Details
5OSV▶
Caddy is vulnerable to cross-origin config application via local admin API /load in github.com/caddyserver/caddy/v2↗2026-02-26
CVEList
▶
📋Vendor Advisories
1Debian▶
CVE-2026-27589: caddy - Caddy is an extensible server platform that uses TLS by default. Prior to versio...↗2026