CVE-2026-30852 — Injection in Caddyserver Caddy V2
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 87.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 7
Latest updateMar 10
Description
Caddy is an extensible server platform that uses TLS by default. From version 2.7.5 to before version 2.11.2, the vars_regexp matcher in vars.go:337 double-expands user-controlled input through the Caddy replacer. When vars_regexp matches against a placeholder like {http.request.header.X-Input}, the header value gets resolved once (expected), then passed through repl.ReplaceAll() again (the bug). This means an attacker can put {env.DATABASE_URL} or {file./etc/passwd} in a request header and the …
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Packages4 packages
Patches
🔴Vulnerability Details
5OSV▶
Caddy's vars_regexp double-expands user input, leaking env vars and files in github.com/caddyserver/caddy↗2026-03-10
📋Vendor Advisories
1Debian▶
CVE-2026-30852: caddy - Caddy is an extensible server platform that uses TLS by default. From version 2....↗2026