CVE-2026-30851Improper Authentication in Caddyserver Caddy V2

Severity
8.8HIGHNVD
CNA8.1
EPSS
0.0%
top 94.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 7
Latest updateMar 10

Description

Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has been patched in version 2.11.2.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

NVDcaddyserver/caddy2.10.02.11.2
Gogithub.com/caddyserver_caddy_v22.10.02.11.2
CVEListV5caddyserver/caddy>= 2.10.0, < 2.11.2

Patches

🔴Vulnerability Details

5
OSV
Caddy forward_auth copy_headers allows Identity Injection and Privilege Escalation in github.com/caddyserver/caddy2026-03-10
OSV
CVE-2026-30851: Caddy is an extensible server platform that uses TLS by default2026-03-07
CVEList
Caddy forward_auth copy_headers Does Not Strip Client-Supplied Headers, Allowing Identity Injection and Privilege Escalation2026-03-07
GHSA
Caddy forward_auth copy_headers Does Not Strip Client-Supplied Headers, Allowing Identity Injection and Privilege Escalation2026-03-06
OSV
Caddy forward_auth copy_headers Does Not Strip Client-Supplied Headers, Allowing Identity Injection and Privilege Escalation2026-03-06

📋Vendor Advisories

1
Debian
CVE-2026-30851: caddy - Caddy is an extensible server platform that uses TLS by default. From version 2....2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-30851 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-30851 — Improper Authentication | cvebase