Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-27590

CVE-2026-27590: Caddyserver Caddy RCE Vulnerability

CVE-2026-27590 is a remote code execution vulnerability in Caddyserver Caddy caused by unsafe Unicode handling in FastCGI path splitting. This flaw can allow attackers to execute unintended PHP files. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: February 27, 2026

CVE-2026-27590 Overview

CVE-2026-27590 is a path confusion vulnerability in Caddy, an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's FastCGI path splitting logic computes the split index on a lowercased copy of the request path and then uses that byte index to slice the original path. This is unsafe for Unicode because strings.ToLower() can change UTF-8 byte length for some characters. As a result, Caddy can derive an incorrect SCRIPT_NAME/SCRIPT_FILENAME and PATH_INFO, potentially causing a request that contains .php to execute a different on-disk file than intended.

Critical Impact

In setups where an attacker can control file contents (e.g., upload features), this vulnerability can lead to unintended PHP execution of non-.php files, potentially resulting in Remote Code Execution (RCE) depending on deployment configuration.

Affected Products

  • Caddyserver Caddy versions prior to 2.11.1
  • Caddy deployments using FastCGI with PHP backends
  • FrankenPHP deployments using affected Caddy versions

Discovery Timeline

  • 2026-02-24 - CVE-2026-27590 published to NVD
  • 2026-02-25 - Last updated in NVD database

Technical Details for CVE-2026-27590

Vulnerability Analysis

This vulnerability stems from an improper input validation issue (CWE-20) in Caddy's FastCGI path splitting mechanism. The core problem lies in how Caddy handles Unicode characters during path processing. When a request path contains certain Unicode characters, the strings.ToLower() function in Go can produce a string with a different byte length than the original. This byte length discrepancy creates a mismatch between the computed split index and the actual path structure.

The practical impact is that Caddy may incorrectly calculate where to split the path for determining SCRIPT_NAME, SCRIPT_FILENAME, and PATH_INFO FastCGI variables. This path confusion can cause the server to execute a different file than what the URL path appears to reference.

Root Cause

The root cause is the unsafe handling of Unicode byte lengths during path splitting operations. The vulnerability occurs because:

  1. Caddy performs path splitting calculations on a lowercased copy of the request path
  2. The strings.ToLower() function can alter UTF-8 byte length for certain characters (such as specific Turkish or German characters)
  3. The calculated byte index is then applied to the original path, which may have different byte boundaries
  4. This mismatch results in incorrect path splitting and script filename derivation

Attack Vector

This vulnerability is exploitable over the network without authentication. An attacker can craft malicious HTTP requests containing specific Unicode characters in the path that exploit the byte length discrepancy. The attack scenario typically involves:

  1. Uploading a malicious file with non-.php extension to the server (e.g., through an upload feature)
  2. Crafting a request with Unicode characters that causes path confusion
  3. Manipulating the request so that the intended .php script execution instead triggers execution of the uploaded malicious file

The vulnerability requires the attacker to have some ability to control file contents on the server, such as through upload functionality, making it dependent on specific deployment configurations. However, when exploitable, the impact can be severe, potentially allowing Remote Code Execution on the affected server.

Detection Methods for CVE-2026-27590

Indicators of Compromise

  • Unusual HTTP requests containing non-standard Unicode characters in PHP-related paths
  • Web server logs showing discrepancies between requested paths and executed scripts
  • Unexpected PHP execution of files with non-.php extensions
  • Upload directories containing files with suspicious content despite non-executable extensions

Detection Strategies

  • Monitor web server access logs for requests containing unusual Unicode character sequences targeting FastCGI endpoints
  • Implement anomaly detection for path patterns that include multibyte Unicode characters followed by .php extensions
  • Review file execution logs for PHP processes that execute files outside expected script directories
  • Deploy Web Application Firewall (WAF) rules to detect and block requests with suspicious Unicode path manipulation attempts

Monitoring Recommendations

  • Enable verbose logging for FastCGI module operations in Caddy
  • Set up alerts for file execution events from upload directories or user-writable locations
  • Monitor for unusual process spawning patterns from the web server process
  • Implement file integrity monitoring on directories accessible via web requests

How to Mitigate CVE-2026-27590

Immediate Actions Required

  • Upgrade Caddy to version 2.11.1 or later immediately
  • Review server configurations to identify deployments using FastCGI with PHP backends
  • Audit file upload functionality to ensure uploaded files cannot be executed as PHP scripts
  • Implement strict file type validation on upload endpoints to prevent malicious file uploads

Patch Information

Caddyserver has released version 2.11.1 which addresses this vulnerability. The fix ensures proper handling of Unicode byte lengths during path splitting operations. Administrators should upgrade to this version as soon as possible. For detailed information about the patch, refer to the Caddy Release v2.11.1 and the GitHub Security Advisory.

Workarounds

  • Restrict file upload functionality to prevent users from uploading files with arbitrary content
  • Configure the web server to only execute PHP files from specific, restricted directories that are not writable by upload processes
  • Implement strict input validation on request paths to reject or sanitize unusual Unicode character sequences
  • Use separate storage locations for uploaded files that are not accessible via FastCGI execution paths
bash
# Configuration example - Restrict PHP execution to specific directories only
# In Caddyfile, ensure php_fastcgi is only configured for trusted script paths
example.com {
    root * /var/www/html
    
    # Only allow PHP execution from specific directories
    @php_allowed path /app/*.php /scripts/*.php
    php_fastcgi @php_allowed unix//run/php/php-fpm.sock
    
    # Ensure uploads directory cannot execute PHP
    handle /uploads/* {
        file_server
    }
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechCaddy

  • SeverityHIGH

  • CVSS Score8.9

  • EPSS Probability0.12%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-20
  • Technical References
  • Caddy Release v2.11.1

  • GitHub Security Advisory GHSA-g966-83w7-6w38
  • Vendor Resources
  • GitHub Security Advisory GHSA-5r3v-vc8m-m96g
  • Related CVEs
  • CVE-2026-30851: Caddy Privilege Escalation Vulnerability

  • CVE-2026-27587: Caddyserver Auth Bypass Vulnerability

  • CVE-2026-27588: Caddyserver Auth Bypass Vulnerability

  • CVE-2026-27589: Caddyserver Caddy CSRF Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English