Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-27590
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-24 Feb, 2026 | 16:33
Updated At-24 Feb, 2026 | 16:33
Rejected At-
▼CVE Numbering Authority (CNA)
Caddy: Unicode case-folding length expansion causes incorrect split_path index (SCRIPT_NAME/PATH_INFO confusion) in FastCGI transport

Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's FastCGI path splitting logic computes the split index on a lowercased copy of the request path and then uses that byte index to slice the original path. This is unsafe for Unicode because `strings.ToLower()` can change UTF-8 byte length for some characters. As a result, Caddy can derive an incorrect `SCRIPT_NAME`/`SCRIPT_FILENAME` and `PATH_INFO`, potentially causing a request that contains `.php` to execute a different on-disk file than intended (path confusion). In setups where an attacker can control file contents (e.g., upload features), this can lead to unintended PHP execution of non-.php files (potential RCE depending on deployment). Version 2.11.1 fixes the issue.

Affected Products
Vendor
caddyserver
Product
caddy
Versions
Affected
  • < 2.11.1
Problem Types
TypeCWE IDDescription
CWECWE-20CWE-20: Improper Input Validation
CWECWE-180CWE-180: Incorrect Behavior Order: Validate Before Canonicalize
Type: CWE
CWE ID: CWE-20
Description: CWE-20: Improper Input Validation
Type: CWE
CWE ID: CWE-180
Description: CWE-180: Incorrect Behavior Order: Validate Before Canonicalize
Metrics
VersionBase scoreBase severityVector
4.08.9HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
Version: 4.0
Base score: 8.9
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/caddyserver/caddy/security/advisories/GHSA-5r3v-vc8m-m96g
x_refsource_CONFIRM
https://github.com/php/frankenphp/security/advisories/GHSA-g966-83w7-6w38
x_refsource_MISC
https://github.com/caddyserver/caddy/releases/tag/v2.11.1
x_refsource_MISC
Hyperlink: https://github.com/caddyserver/caddy/security/advisories/GHSA-5r3v-vc8m-m96g
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/php/frankenphp/security/advisories/GHSA-g966-83w7-6w38
Resource:
x_refsource_MISC
Hyperlink: https://github.com/caddyserver/caddy/releases/tag/v2.11.1
Resource:
x_refsource_MISC
Details not found