Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27589: CWE-352: Cross-Site Request Forgery (CSRF) in caddyserver caddy

0
Medium
VulnerabilityCVE-2026-27589cvecve-2026-27589cwe-352
Published: Tue Feb 24 2026 (02/24/2026, 16:30:52 UTC)
Source: CVE Database V5
Vendor/Project: caddyserver
Product: caddy

Description

Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the local caddy admin API (default listen `127.0.0.1:2019`) exposes a state-changing `POST /load` endpoint that replaces the entire running configuration. When origin enforcement is not enabled (`enforce_origin` not configured), the admin endpoint accepts cross-origin requests (e.g., from attacker-controlled web content in a victim browser) and applies an attacker-supplied JSON config. This can change the admin listener settings and alter HTTP server behavior without user intent. Version 2.11.1 contains a fix for the issue.

AI-Powered Analysis

AILast updated: 02/24/2026, 20:54:18 UTC

Technical Analysis

CVE-2026-27589 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Caddy web server platform versions prior to 2.11.1. Caddy is an extensible server that uses TLS by default and includes a local administrative API listening on 127.0.0.1:2019. This API exposes a state-changing POST /load endpoint that allows replacing the entire running configuration of the server. The vulnerability arises when the 'enforce_origin' configuration is not enabled, causing the admin API to accept cross-origin requests. An attacker can exploit this by hosting malicious web content that a victim accesses, causing the victim's browser to send unauthorized POST requests to the local admin API. These requests can include attacker-supplied JSON configurations that modify the server's behavior, including changing admin listener settings or HTTP server configurations, without the user's knowledge or consent. The vulnerability does not require authentication or user interaction beyond visiting a malicious web page, making it relatively easy to exploit in environments where the admin API is accessible. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, but high impact on integrity due to unauthorized configuration changes. The vulnerability was addressed in Caddy version 2.11.1 by enabling origin enforcement on the admin API, preventing cross-origin requests from unauthorized sources. No known exploits have been reported in the wild as of the publication date. However, the potential for unauthorized configuration changes poses significant risk to server integrity and security posture. Organizations running vulnerable versions should update promptly and consider additional network-level restrictions to the admin API endpoint.

Potential Impact

The primary impact of CVE-2026-27589 is unauthorized modification of the Caddy server's configuration via the local admin API. This can lead to significant integrity violations, including altering server behavior, changing listener settings, or disabling security features. Such unauthorized changes can facilitate further attacks, such as redirecting traffic, enabling malicious modules, or exposing sensitive data. Since the admin API listens on localhost by default, the attack requires the victim to access attacker-controlled web content, which can be feasible in environments where users browse untrusted sites. The vulnerability does not directly impact confidentiality or availability but can indirectly lead to data exposure or service disruption if attackers modify configurations maliciously. The ease of exploitation without authentication and user interaction (beyond visiting a malicious page) increases risk in environments with vulnerable Caddy deployments. Organizations relying on Caddy for web services, especially those exposing local admin APIs without strict origin enforcement or network restrictions, face increased risk of compromise and operational disruption.

Mitigation Recommendations

1. Upgrade Caddy to version 2.11.1 or later, which includes the fix enabling origin enforcement on the admin API to prevent cross-origin requests. 2. If immediate upgrade is not possible, manually enable 'enforce_origin' configuration on the admin API to restrict accepted request origins. 3. Restrict access to the admin API endpoint (127.0.0.1:2019) using firewall rules or network segmentation to prevent unauthorized access from untrusted sources. 4. Employ browser security policies such as Content Security Policy (CSP) to limit the ability of attacker-controlled web content to make requests to localhost addresses. 5. Monitor server logs for unexpected POST /load requests or configuration changes to detect potential exploitation attempts. 6. Educate users about the risks of visiting untrusted websites that could host malicious content triggering CSRF attacks. 7. Consider running the admin API on a non-default interface or port with strict access controls to reduce exposure. 8. Regularly audit server configurations and access controls to ensure no unauthorized changes have occurred.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T17:40:28.450Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e0f3cbe58cf853b290cd9

Added to database: 2/24/2026, 8:51:08 PM

Last enriched: 2/24/2026, 8:54:18 PM

Last updated: 2/24/2026, 11:59:15 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats