LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-30851

CVE-2026-30851 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: March 9, 2026

Caddy - Broken Access Control

Published: March 7, 2026Updated: March 9, 2026Remote Exploitable

Overview

Caddy 2.10.0 to < 2.11.2 contains a broken access control vulnerability caused by forward_auth copy_headers not stripping client-supplied headers, letting attackers perform identity injection and privilege escalation, exploit requires client to supply crafted headers.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 1.5%(Probability of exploitation in next 30 days)

Impact

Attackers can escalate privileges by injecting identities via client-supplied headers, compromising access control.

Mitigation

Upgrade to version 2.11.2 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 8, 2026

🟠 CVE-2026-30851 - High (8.1) Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has b... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-30851/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-30851
Severity
High
CVSS Score
8.1
Type
broken_access_control
Status
unconfirmed
EPSS
1.5%
Social Posts
1

CWE

  • CWE-287

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS Score

1.5%Probability of exploitation in the next 30 days