{"id":"UBUNTU-CVE-2026-30851","details":"Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has been patched in version 2.11.2.","modified":"2026-03-25T19:48:47.944445Z","published":"2026-03-07T17:15:00Z","upstream":["CVE-2026-30851"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-30851"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2026-30851"},{"type":"REPORT","url":"https://github.com/caddyserver/caddy/security/advisories/GHSA-7r4p-vjf4-gxv4"},{"type":"REPORT","url":"https://github.com/caddyserver/caddy/issues/6610"},{"type":"REPORT","url":"https://github.com/caddyserver/caddy/pull/6608"},{"type":"REPORT","url":"https://github.com/caddyserver/caddy/pull/7545"}],"affected":[{"package":{"name":"caddy","ecosystem":"Ubuntu:Pro:24.04:LTS","purl":"pkg:deb/ubuntu/caddy@2.6.2-6ubuntu0.24.04.3+esm2?arch=source&distro=esm-apps/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.2-6","2.6.2-6ubuntu0.24.04.1","2.6.2-6ubuntu0.24.04.2","2.6.2-6ubuntu0.24.04.2+esm1","2.6.2-6ubuntu0.24.04.3","2.6.2-6ubuntu0.24.04.3+esm1","2.6.2-6ubuntu0.24.04.3+esm2"],"ecosystem_specific":{"binaries":[{"binary_name":"caddy","binary_version":"2.6.2-6ubuntu0.24.04.3+esm2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-30851.json"}},{"package":{"name":"caddy","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/caddy@2.6.2-12?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.2-9","2.6.2-11","2.6.2-12"],"ecosystem_specific":{"binaries":[{"binary_name":"caddy","binary_version":"2.6.2-12"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-30851.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}