Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whitelisted domains to reach out through the 8080 port, and shows Host/IP is not allowed to connect to Caido on all endpoints. But this is bypassable by injecting a X-Forwarded-Host: 127.0.0.1:8080 header. This vulnerability is fixed in 0.55.0.
History

Tue, 24 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:caido:caido:*:*:*:*:*:*:*:*

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Caido
Caido caido
Vendors & Products Caido
Caido caido

Fri, 13 Feb 2026 22:45:00 +0000

Type Values Removed Values Added
Description Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whitelisted domains to reach out through the 8080 port, and shows Host/IP is not allowed to connect to Caido on all endpoints. But this is bypassable by injecting a X-Forwarded-Host: 127.0.0.1:8080 header. This vulnerability is fixed in 0.55.0.
Title Caido has an insufficient patch for DNS rebind leading to RCE
Weaknesses CWE-290
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-02-13T22:19:47.142Z

Updated: 2026-02-17T15:08:07.180Z

Reserved: 2026-01-27T14:51:03.061Z

Link: CVE-2026-24853

cve-icon Vulnrichment

Updated: 2026-02-17T15:08:02.885Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-13T23:16:11.800

Modified: 2026-02-24T20:32:18.710

Link: CVE-2026-24853

cve-icon Redhat

No data.