{"id":"UBUNTU-CVE-2026-27587","details":"Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's HTTP `path` request matcher is intended to be case-insensitive, but when the match pattern contains percent-escape sequences (`%xx`) it compares against the request's escaped path without lowercasing. An attacker can bypass path-based routing and any access controls attached to that route by changing the casing of the request path. Version 2.11.1 contains a fix for the issue.","modified":"2026-03-25T19:48:56.004148Z","published":"2026-02-24T17:29:00Z","upstream":["CVE-2026-27587"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-27587"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2026-27587"},{"type":"REPORT","url":"https://github.com/caddyserver/caddy/security/advisories/GHSA-g7pc-pc7g-h8jh"},{"type":"REPORT","url":"https://github.com/caddyserver/caddy/releases/tag/v2.11.1"}],"affected":[{"package":{"name":"caddy","ecosystem":"Ubuntu:Pro:24.04:LTS","purl":"pkg:deb/ubuntu/caddy@2.6.2-6ubuntu0.24.04.3+esm2?arch=source&distro=esm-apps/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.2-6","2.6.2-6ubuntu0.24.04.1","2.6.2-6ubuntu0.24.04.2","2.6.2-6ubuntu0.24.04.2+esm1","2.6.2-6ubuntu0.24.04.3","2.6.2-6ubuntu0.24.04.3+esm1","2.6.2-6ubuntu0.24.04.3+esm2"],"ecosystem_specific":{"binaries":[{"binary_name":"caddy","binary_version":"2.6.2-6ubuntu0.24.04.3+esm2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27587.json"}},{"package":{"name":"caddy","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/caddy@2.6.2-12?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.2-9","2.6.2-11","2.6.2-12"],"ecosystem_specific":{"binaries":[{"binary_name":"caddy","binary_version":"2.6.2-12"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27587.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]}