CVE-2026-24853
📋 TL;DR
This vulnerability allows attackers to bypass Caido's domain whitelist protection by injecting a malicious X-Forwarded-Host header, enabling unauthorized access to the Caido web interface. It affects all Caido instances running versions prior to 0.55.0 that have domain whitelisting enabled. Security teams using Caido for web security auditing are impacted.
💻 Affected Systems
- Caido
📦 What is this software?
Caido by Caido
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative access to the Caido instance, potentially compromising the entire web security auditing infrastructure and accessing sensitive scan data.
Likely Case
Unauthorized users bypass security controls to access Caido's web interface, potentially viewing or modifying security scan configurations and results.
If Mitigated
With proper network segmentation and access controls, impact is limited to the Caido instance itself without lateral movement.
🎯 Exploit Status
Exploitation requires sending a single HTTP header modification.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.55.0
Vendor Advisory: https://github.com/caido/caido/security/advisories/GHSA-3q5q-p8vj-8783
Restart Required: Yes
Instructions:
1. Stop the Caido service. 2. Update Caido to version 0.55.0 or later. 3. Restart the Caido service.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict network access to Caido's port 8080 using firewall rules.
iptables -A INPUT -p tcp --dport 8080 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 8080 -j DROP
Reverse Proxy Configuration
allConfigure a reverse proxy to strip or validate X-Forwarded-Host headers before they reach Caido.
proxy_set_header X-Forwarded-Host "";
🧯 If You Can't Patch
- Change Caido's default port from 8080 to a non-standard port.
- Disable domain whitelisting feature if not required for your use case.
🔍 How to Verify
Check if Vulnerable:
Send an HTTP request to Caido's port 8080 with header 'X-Forwarded-Host: 127.0.0.1:8080' and check if access is granted despite domain restrictions.
Check Version:
caido --version
Verify Fix Applied:
After patching, repeat the vulnerable test; access should be properly denied with the malicious header.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with X-Forwarded-Host header containing localhost or 127.0.0.1
- Access logs showing successful connections from non-whitelisted domains
Network Indicators:
- Unusual HTTP traffic to port 8080 with modified headers
- Traffic patterns bypassing expected domain restrictions
SIEM Query:
source="caido_logs" AND (http_header="X-Forwarded-Host: 127.0.0.1" OR http_header="X-Forwarded-Host: localhost")