Generated remediation guidance and an executive summary. No account required.
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's HTTP `host` request matcher is documented as case-insensitive, but when configured with a large host list (>100 entries) it becomes case-sensitive due to an optimized matching path. An attacker can bypass host-based routing and any access controls attached to that route by changing the casing of the `Host` header. Version 2.11.1 contains a fix for the issue.
Use CWE-178, Caddyserver vendor hub and Caddy product page to widen CVE-2026-27588 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2023-44487, CVE-2026-27590 and CVE-2026-27586 for nearby disclosures in the same product family.