Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0357

NIXPKGS-2026-0357
published on 27 Feb 2026
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    7 packages
    • xcaddy
    • caddyfile-language-server
    • vimPlugins.nvim-treesitter-parsers.caddy
    • tree-sitter-grammars.tree-sitter-caddyfile
    • vscode-extensions.matthewpi.caddyfile-support
    • python313Packages.tree-sitter-grammars.tree-sitter-caddyfile
    • python314Packages.tree-sitter-grammars.tree-sitter-caddyfile
  • @LeSuisse accepted
  • @LeSuisse removed
    4 maintainers
    • @ryan4yin
    • @techknowlogick
    • @Br1ght0ne
    • @stepbrobd
  • @LeSuisse published on GitHub
Caddy: Unicode case-folding length expansion causes incorrect split_path index (SCRIPT_NAME/PATH_INFO confusion) in FastCGI transport

Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's FastCGI path splitting logic computes the split index on a lowercased copy of the request path and then uses that byte index to slice the original path. This is unsafe for Unicode because `strings.ToLower()` can change UTF-8 byte length for some characters. As a result, Caddy can derive an incorrect `SCRIPT_NAME`/`SCRIPT_FILENAME` and `PATH_INFO`, potentially causing a request that contains `.php` to execute a different on-disk file than intended (path confusion). In setups where an attacker can control file contents (e.g., upload features), this can lead to unintended PHP execution of non-.php files (potential RCE depending on deployment). Version 2.11.1 fixes the issue.

Affected products

caddy
  • ==< 2.11.1

Matching in nixpkgs

Ignored packages (7)

Package maintainers

Ignored maintainers (4)
Upstream advisory: https://github.com/caddyserver/caddy/security/advisories/GHSA-5r3v-vc8m-m96g