CVE-2026-24853

Source
https://cve.org/CVERecord?id=CVE-2026-24853
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24853.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-24853
Aliases
  • GHSA-3q5q-p8vj-8783
Published
2026-02-13T22:19:47.142Z
Modified
2026-02-26T01:23:47.988992Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Caido has an insufficient patch for DNS rebind leading to RCE
Details

Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whitelisted domains to reach out through the 8080 port, and shows Host/IP is not allowed to connect to Caido on all endpoints. But this is bypassable by injecting a X-Forwarded-Host: 127.0.0.1:8080 header. This vulnerability is fixed in 0.55.0.

Database specific
{
    "cwe_ids": [
        "CWE-290"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24853.json"
}
References

Affected packages

Git / github.com/caido/caido

Affected ranges

Type
GIT
Repo
https://github.com/caido/caido
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.22.1
v0.23.1
v0.24.0
v0.24.1
v0.25.0
v0.25.3
v0.26.0
v0.27.1
v0.27.2
v0.28.0
v0.29.0
v0.29.2
v0.30.0
v0.30.1
v0.30.2
v0.30.3
v0.30.4
v0.31.0
v0.31.1
v0.32.0
v0.32.1
v0.33.0
v0.34.0
v0.34.1
v0.35.0
v0.36.0
v0.36.1
v0.37.0
v0.38.0
v0.39.0
v0.40.0
v0.41.0
v0.42.0
v0.43.0
v0.43.1
v0.44.0
v0.44.1
v0.45.0
v0.45.1
v0.46.0
v0.47.0
v0.47.1
v0.48.0
v0.48.1
v0.49.0
v0.50.0
v0.50.1
v0.50.2
v0.51.0
v0.51.1
v0.52.0
v0.53.0
v0.53.1
v0.54.0
v0.54.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24853.json"