Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m2w3-8f23-hxxf | Caddy's vars_regexp double-expands user input, leaking env vars and files |
Wed, 11 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 09 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Caddyserver
Caddyserver caddy |
|
| Vendors & Products |
Caddyserver
Caddyserver caddy |
Sat, 07 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Caddy is an extensible server platform that uses TLS by default. From version 2.7.5 to before version 2.11.2, the vars_regexp matcher in vars.go:337 double-expands user-controlled input through the Caddy replacer. When vars_regexp matches against a placeholder like {http.request.header.X-Input}, the header value gets resolved once (expected), then passed through repl.ReplaceAll() again (the bug). This means an attacker can put {env.DATABASE_URL} or {file./etc/passwd} in a request header and the server will evaluate it, leaking environment variables, file contents, and system info. This issue has been patched in version 2.11.2. | |
| Title | Caddy: vars_regexp double-expands user input, leaking env vars and files | |
| Weaknesses | CWE-200 CWE-74 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T18:24:55.495Z
Reserved: 2026-03-05T21:27:35.341Z
Link: CVE-2026-30852
Updated: 2026-03-09T18:19:35.549Z
Status : Analyzed
Published: 2026-03-07T17:15:52.733
Modified: 2026-03-11T13:01:46.030
Link: CVE-2026-30852
No data.
OpenCVE Enrichment
Updated: 2026-04-18T10:00:10Z
Github GHSA