Improper Handling of Exceptional Conditions Affecting caddy-man package, versions <2.11.1-r0


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.08% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-CADDYMAN-15365830
  • published1 Mar 2026
  • disclosed24 Feb 2026

Introduced: 24 Feb 2026

CVE-2026-27586  (opens in a new tab)
CWE-755  (opens in a new tab)

How to fix?

Upgrade Minimos:latest caddy-man to version 2.11.1-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream caddy-man package and not the caddy-man package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, two swallowed errors in ClientAuthentication.provision() cause mTLS client certificate authentication to silently fail open when a CA certificate file is missing, unreadable, or malformed. The server starts without error but accepts any client certificate signed by any system-trusted CA, completely bypassing the intended private CA trust boundary. Any deployment using trusted_ca_cert_file or trusted_ca_certs_pem_files for mTLS will silently degrade to accepting any system-trusted client certificate if the CA file becomes unavailable. This can happen due to a typo in the path, file rotation, corruption, or permission changes. The server gives no indication that mTLS is misconfigured. Version 2.11.1 fixes the vulnerability.

CVSS Base Scores

version 3.1