{"id":"CVE-2026-27589","summary":"Caddy vulnerable to cross-origin config application via local admin API /load (caddy)","details":"Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the local caddy admin API (default listen `127.0.0.1:2019`) exposes a state-changing `POST /load` endpoint that replaces the entire running configuration. When origin enforcement is not enabled (`enforce_origin` not configured), the admin endpoint accepts cross-origin requests (e.g., from attacker-controlled web content in a victim browser) and applies an attacker-supplied JSON config. This can change the admin listener settings and alter HTTP server behavior without user intent. Version 2.11.1 contains a fix for the issue.","aliases":["GHSA-879p-475x-rqh2","GO-2026-4537"],"modified":"2026-04-10T05:39:03.959528Z","published":"2026-02-24T16:30:52.016Z","related":["SUSE-SU-2026:0757-1"],"database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-352"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27589.json"},"references":[{"type":"WEB","url":"https://github.com/caddyserver/caddy/releases/tag/v2.11.1"},{"type":"WEB","url":"https://github.com/user-attachments/files/25079818/poc.zip"},{"type":"WEB","url":"https://github.com/user-attachments/files/25079820/PR_DESCRIPTION.md"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27589.json"},{"type":"ADVISORY","url":"https://github.com/caddyserver/caddy/security/advisories/GHSA-879p-475x-rqh2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27589"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/caddyserver/caddy","events":[{"introduced":"0"},{"fixed":"6610e2f1bd8f54853006eefd3849c9965190e57f"}]}],"versions":["v2.0.0","v2.0.0-beta.13","v2.0.0-beta.14","v2.0.0-beta.15","v2.0.0-beta.16","v2.0.0-beta.17","v2.0.0-beta.18","v2.0.0-beta.19","v2.0.0-beta.20","v2.0.0-beta1","v2.0.0-beta10","v2.0.0-beta11","v2.0.0-beta12","v2.0.0-beta2","v2.0.0-beta3","v2.0.0-beta4","v2.0.0-beta5","v2.0.0-beta6","v2.0.0-beta7","v2.0.0-beta8","v2.0.0-beta9","v2.0.0-rc.1","v2.0.0-rc.2","v2.0.0-rc.3","v2.1.0","v2.1.0-beta.1","v2.1.0-beta.2","v2.1.1","v2.10.0","v2.10.0-beta.1","v2.10.0-beta.2","v2.10.0-beta.3","v2.10.0-beta.4","v2.10.1","v2.10.2","v2.11.0","v2.11.0-beta.1","v2.11.0-beta.2","v2.2.0","v2.2.0-rc.1","v2.2.0-rc.2","v2.2.0-rc.3","v2.2.1","v2.2.3","v2.3.0","v2.3.0-beta.1","v2.3.0-rc.1","v2.3.0-rc.2","v2.4.0","v2.4.0-beta.1","v2.4.0-beta.2","v2.4.0-rc.1","v2.4.1","v2.4.2","v2.4.3","v2.4.4","v2.4.5","v2.4.6","v2.5.0","v2.5.0-beta.1","v2.5.0-rc.1","v2.5.1","v2.5.2","v2.6.0","v2.6.0-beta.1","v2.6.0-beta.2","v2.6.0-beta.3","v2.6.0-beta.4","v2.6.0-beta.5","v2.6.1","v2.6.2","v2.6.3","v2.6.4","v2.7.0","v2.7.0-beta.1","v2.7.0-beta.2","v2.7.1","v2.7.2","v2.7.3","v2.7.4","v2.7.5","v2.8.0","v2.8.0-beta.1","v2.8.0-beta.2","v2.8.0-rc.1","v2.8.1","v2.8.2","v2.8.3","v2.8.4","v2.9.0","v2.9.0-beta.1","v2.9.0-beta.2","v2.9.0-beta.3","v2.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27589.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mholt/caddy","events":[{"introduced":"0"},{"fixed":"6610e2f1bd8f54853006eefd3849c9965190e57f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.11.1"}]}}],"versions":["v2.0.0","v2.0.0-beta.13","v2.0.0-beta.14","v2.0.0-beta.15","v2.0.0-beta.16","v2.0.0-beta.17","v2.0.0-beta.18","v2.0.0-beta.19","v2.0.0-beta.20","v2.0.0-beta1","v2.0.0-beta10","v2.0.0-beta11","v2.0.0-beta12","v2.0.0-beta2","v2.0.0-beta3","v2.0.0-beta4","v2.0.0-beta5","v2.0.0-beta6","v2.0.0-beta7","v2.0.0-beta8","v2.0.0-beta9","v2.0.0-rc.1","v2.0.0-rc.2","v2.0.0-rc.3","v2.1.0","v2.1.0-beta.1","v2.1.0-beta.2","v2.1.1","v2.10.0","v2.10.0-beta.1","v2.10.0-beta.2","v2.10.0-beta.3","v2.10.0-beta.4","v2.10.1","v2.10.2","v2.11.0","v2.11.0-beta.1","v2.11.0-beta.2","v2.2.0","v2.2.0-rc.1","v2.2.0-rc.2","v2.2.0-rc.3","v2.2.1","v2.2.3","v2.3.0","v2.3.0-beta.1","v2.3.0-rc.1","v2.3.0-rc.2","v2.4.0","v2.4.0-beta.1","v2.4.0-beta.2","v2.4.0-rc.1","v2.4.1","v2.4.2","v2.4.3","v2.4.4","v2.4.5","v2.4.6","v2.5.0","v2.5.0-beta.1","v2.5.0-rc.1","v2.5.1","v2.5.2","v2.6.0","v2.6.0-beta.1","v2.6.0-beta.2","v2.6.0-beta.3","v2.6.0-beta.4","v2.6.0-beta.5","v2.6.1","v2.6.2","v2.6.3","v2.6.4","v2.7.0","v2.7.0-beta.1","v2.7.0-beta.2","v2.7.1","v2.7.2","v2.7.3","v2.7.4","v2.7.5","v2.8.0","v2.8.0-beta.1","v2.8.0-beta.2","v2.8.0-rc.1","v2.8.1","v2.8.2","v2.8.3","v2.8.4","v2.9.0","v2.9.0-beta.1","v2.9.0-beta.2","v2.9.0-beta.3","v2.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27589.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"}]}