{"id":"UBUNTU-CVE-2026-27589","details":"Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the local caddy admin API (default listen `127.0.0.1:2019`) exposes a state-changing `POST /load` endpoint that replaces the entire running configuration. When origin enforcement is not enabled (`enforce_origin` not configured), the admin endpoint accepts cross-origin requests (e.g., from attacker-controlled web content in a victim browser) and applies an attacker-supplied JSON config. This can change the admin listener settings and alter HTTP server behavior without user intent. Version 2.11.1 contains a fix for the issue.","modified":"2026-04-27T19:55:41.029527Z","published":"2026-02-24T17:29:00Z","upstream":["CVE-2026-27589"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-27589"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2026-27589"},{"type":"REPORT","url":"https://github.com/caddyserver/caddy/security/advisories/GHSA-879p-475x-rqh2"},{"type":"REPORT","url":"https://github.com/caddyserver/caddy/releases/tag/v2.11.1"},{"type":"REPORT","url":"https://github.com/user-attachments/files/25079818/poc.zip"},{"type":"REPORT","url":"https://github.com/user-attachments/files/25079820/PR_DESCRIPTION.md"}],"affected":[{"package":{"name":"caddy","ecosystem":"Ubuntu:Pro:24.04:LTS","purl":"pkg:deb/ubuntu/caddy@2.6.2-6ubuntu0.24.04.3+esm2?arch=source&distro=esm-apps/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.2-6","2.6.2-6ubuntu0.24.04.1","2.6.2-6ubuntu0.24.04.2","2.6.2-6ubuntu0.24.04.2+esm1","2.6.2-6ubuntu0.24.04.3","2.6.2-6ubuntu0.24.04.3+esm1","2.6.2-6ubuntu0.24.04.3+esm2"],"ecosystem_specific":{"binaries":[{"binary_name":"caddy","binary_version":"2.6.2-6ubuntu0.24.04.3+esm2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27589.json"}},{"package":{"name":"caddy","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/caddy@2.6.2-12?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.2-9","2.6.2-11","2.6.2-12"],"ecosystem_specific":{"binaries":[{"binary_name":"caddy","binary_version":"2.6.2-12"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27589.json"}},{"package":{"name":"caddy","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/caddy@2.6.2-14?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.2-12","2.6.2-14"],"ecosystem_specific":{"binaries":[{"binary_name":"caddy","binary_version":"2.6.2-14"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27589.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]}