Generated remediation guidance and an executive summary. No account required.
Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the local caddy admin API (default listen `127.0.0.1:2019`) exposes a state-changing `POST /load` endpoint that replaces the entire running configuration. When origin enforcement is not enabled (`enforce_origin` not configured), the admin endpoint accepts cross-origin requests (e.g., from attacker-controlled web content in a victim browser) and applies an attacker-supplied JSON config. This can change the admin listener settings and alter HTTP server behavior without user intent. Version 2.11.1 contains a fix for the issue.
Use CWE-352, Caddyserver vendor hub and Caddy product page to widen CVE-2026-27589 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2023-44487, CVE-2026-27590 and CVE-2026-27586 for nearby disclosures in the same product family.