Impact
The vulnerability occurs in Caddy’s forward_auth copy_headers functionality, which fails to drop client‑supplied headers. An attacker can inject identity‑related headers, causing the server to trust and authorize the attacker as another user. This leads to unauthorized privilege escalation on the system. The weakness aligns with authentication bypass (CWE‑287) and implicit trust of user data (CWE‑345).
Affected Systems
Caddy server versions from 2.10.0 up to 2.11.1 are affected. Versions 2.11.2 and later include the fix.
Risk and Exploitability
This flaw has a CVSS score of 8.1, denoting high severity. The EPSS score is below 1 %, indicating a very low likelihood of exploitation based on current data, and it is not listed in the CISA KEV catalog. The likely attack involves a remote client sending crafted headers to the Caddy server to manipulate the forwarded identity headers.
OpenCVE Enrichment
Github GHSA