ID

VAR-202602-3024


CVE

CVE-2026-27590


TITLE

Light Code Labs of Caddy Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2026-005155

DESCRIPTION

Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's FastCGI path splitting logic computes the split index on a lowercased copy of the request path and then uses that byte index to slice the original path. This is unsafe for Unicode because `strings.ToLower()` can change UTF-8 byte length for some characters. As a result, Caddy can derive an incorrect `SCRIPT_NAME`/`SCRIPT_FILENAME` and `PATH_INFO`, potentially causing a request that contains `.php` to execute a different on-disk file than intended (path confusion). In setups where an attacker can control file contents (e.g., upload features), this can lead to unintended PHP execution of non-.php files (potential RCE depending on deployment). Version 2.11.1 fixes the issue. Caddy was wrong `SCRIPT_NAME`/`SCRIPT_FILENAME` and `PATH_INFO` and the file on disk is different from the one you intended. RCE This issue can lead to 2.11.1 has been fixed.All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2026-27590 // JVNDB: JVNDB-2026-005155

AFFECTED PRODUCTS

vendor:caddyservermodel:caddyscope:ltversion:2.11.1

Trust: 1.0

vendor:light codemodel:caddyscope:eqversion:2.11.1

Trust: 0.8

vendor:light codemodel:caddyscope: - version: -

Trust: 0.8

vendor:light codemodel:caddyscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-005155 // NVD: CVE-2026-27590

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2026-27590
value: CRITICAL

Trust: 1.0

security-advisories@github.com: CVE-2026-27590
value: HIGH

Trust: 1.0

NVD: CVE-2026-27590
value: CRITICAL

Trust: 0.8

nvd@nist.gov: CVE-2026-27590
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2026-27590
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-005155 // NVD: CVE-2026-27590 // NVD: CVE-2026-27590

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:CWE-180

Trust: 1.0

problemtype:Improper Operation Order ( Validation before normalization )(CWE-180) [ others ]

Trust: 0.8

problemtype: Inappropriate input confirmation (CWE-20) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-005155 // NVD: CVE-2026-27590

PATCH

title:Unicode case-folding length expansion causes incorrect split_path index (SCRIPT_NAME/PATH_INFO confusion) in FastCGI transport  Advisory  caddyserver/caddy  GitHub GitHub Advisory Databaseurl:https://github.com/caddyserver/caddy/security/advisories/GHSA-5r3v-vc8m-m96g

Trust: 0.8

sources: JVNDB: JVNDB-2026-005155

EXTERNAL IDS

db:NVDid:CVE-2026-27590

Trust: 2.6

db:JVNDBid:JVNDB-2026-005155

Trust: 0.8

sources: JVNDB: JVNDB-2026-005155 // NVD: CVE-2026-27590

REFERENCES

url:https://github.com/caddyserver/caddy/releases/tag/v2.11.1

Trust: 1.8

url:https://github.com/php/frankenphp/security/advisories/ghsa-g966-83w7-6w38

Trust: 1.0

url:https://github.com/caddyserver/caddy/security/advisories/ghsa-5r3v-vc8m-m96g

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-27590

Trust: 0.8

sources: JVNDB: JVNDB-2026-005155 // NVD: CVE-2026-27590

SOURCES

db:JVNDBid:JVNDB-2026-005155
db:NVDid:CVE-2026-27590

LAST UPDATE DATE

2026-03-01T00:10:48.855000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-005155date:2026-02-27T03:42:00
db:NVDid:CVE-2026-27590date:2026-02-25T17:07:09.600

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-005155date:2026-02-27T00:00:00
db:NVDid:CVE-2026-27590date:2026-02-24T17:29:04.493