Skip to content

Update module github.com/caddyserver/caddy/v2 to v2.11.1#9

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/github.com-caddyserver-caddy-v2-2.x
Open

Update module github.com/caddyserver/caddy/v2 to v2.11.1#9
renovate[bot] wants to merge 1 commit intomainfrom
renovate/github.com-caddyserver-caddy-v2-2.x

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Feb 21, 2026

This PR contains the following updates:

Package Change Age Confidence
github.com/caddyserver/caddy/v2 v2.10.2v2.11.1 age confidence

Release Notes

caddyserver/caddy (github.com/caddyserver/caddy/v2)

v2.11.1

Compare Source

Our community is pleased to announce Caddy 2.11! Of note are new features, numerous bug fixes including several security patches, and various QoL ("quality-of-life") enhancements.

There are no code changes from v2.11.0 other than to a CI job. Due to a recent external change that broke our release process, the first release of 2.11 is v2.11.1.

Special Sponsor Shoutout

Extra big thanks to our major sponsors:

They, along with dozens of smaller sponsors, make this project and new releases possible, together with our maintainer team. Thank you all!

Notable changes

  • Encrypted ClientHello (ECH) keys are rotated automatically.
  • Time-rolling options for logs.
  • SIGUSR1 can now reload configuration if it was initially loaded from a file on the command line and did not get changed via the API.
  • Reverse proxy now automatically rewrites the Host header to the address of the upstream when the upstream is HTTPS (#​7454)
  • log_append can now log request and response bodies, useful for debugging.
  • Our project now implements and requires Assistance Disclosures (for AI/LLMs) on issues, PRs, comments, replies, reviews, etc.
  • Many, many other minor improvements and bug fixes.

Thank you to everyone who was involved this release!

⚠️ Security patches
  • fastcgi: CVE-2026-27590 by @​dunglas and @​AbdrrahimDahmani - Unicode case-folding length expansion causes incorrect split_path index (SCRIPT_NAME/PATH_INFO confusion) in FastCGI transport.
  • admin: CVE-2026-27589 by @​1seal - Cross-origin requests attempted with no-cors mode could cause some API requests to succeed; such requests are now blocked. (In order for this to be practically exploitable, a web browser executing a malicious web page must be running locally to a production Caddy process.)
  • caddyhttp: CVE-2026-27588 by Asim Viladi Oglu Manizada - The Host matcher becomes case-sensitive for large host lists (>100), enabling host-based route/auth bypass.
  • caddyhttp: CVE-2026-27587 by Asim Viladi Oglu Manizada - The Path matcher skips case normalization for escape sequences, enabling path-based route/auth bypass.
  • caddytls: CVE-2026-27586 by @​moscowchill - TLS client authentication silently fails open when CA certificate file is missing or malformed.
  • caddyhttp: CVE-2026-27585 by @​parrot409 - Improper sanitization of glob characters in file matcher may lead to bypassing security protections.

🚨 Notice for Caddy plugin maintainers: Dependabot will probably alert you to the security fixes in Caddy and urge you to upgrade it in your go.mod file. Please ONLY upgrade the Caddy dependency if there's a change to an exported API your plugin uses. (Then, turn Dependabot off.)

What's Changed

New Contributors

Full Changelog: caddyserver/caddy@v2.10.2...v2.11.1

v2.11.0

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Contributor Author

renovate bot commented Feb 21, 2026

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 58 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.25 -> 1.25.0
cel.dev/expr v0.24.0 -> v0.25.1
cloud.google.com/go/auth v0.16.2 -> v0.18.1
cloud.google.com/go/compute/metadata v0.7.0 -> v0.9.0
dario.cat/mergo v1.0.1 -> v1.0.2
filippo.io/edwards25519 v1.1.0 -> v1.2.0
github.com/KimMachineGun/automemlimit v0.7.4 -> v0.7.5
github.com/Masterminds/semver/v3 v3.3.0 -> v3.4.0
github.com/antlr4-go/antlr/v4 v4.13.0 -> v4.13.1
github.com/caddyserver/certmagic v0.24.0 -> v0.25.2
github.com/caddyserver/zerossl v0.1.3 -> v0.1.5
github.com/cloudflare/circl v1.6.1 -> v1.6.3
github.com/coreos/go-oidc/v3 v3.14.1 -> v3.17.0
github.com/go-jose/go-jose/v4 v4.0.5 -> v4.1.3
github.com/golang/glog v1.2.4 -> v1.2.5
github.com/google/cel-go v0.26.0 -> v0.27.0
github.com/googleapis/enterprise-certificate-proxy v0.3.6 -> v0.3.11
github.com/googleapis/gax-go/v2 v2.14.2 -> v2.17.0
github.com/klauspost/compress v1.18.0 -> v1.18.4
github.com/libdns/libdns v1.1.0 -> v1.1.1
github.com/mattn/go-colorable v0.1.13 -> v0.1.14
github.com/mholt/acmez/v3 v3.1.2 -> v3.1.6
github.com/miekg/dns v1.1.63 -> v1.1.72
github.com/prometheus/client_golang v1.23.0 -> v1.23.2
github.com/prometheus/common v0.65.0 -> v0.67.5
github.com/prometheus/procfs v0.16.1 -> v0.19.2
github.com/quic-go/qpack v0.5.1 -> v0.6.0
github.com/quic-go/quic-go v0.54.0 -> v0.59.0
github.com/slackhq/nebula v1.9.5 -> v1.10.3
github.com/smallstep/certificates v0.28.4 -> v0.30.0-rc2.0.20260211214201-20608299c29c
github.com/smallstep/cli-utils v0.12.1 -> v0.12.2
github.com/smallstep/linkedca v0.23.0 -> v0.25.0
github.com/smallstep/scep v0.0.0-20240926084937-8cf1ca453101 -> v0.0.0-20250318231241-a25cabb69492
github.com/spf13/cobra v1.9.1 -> v1.10.2
github.com/spf13/pflag v1.0.7 -> v1.0.10
github.com/tailscale/tscert v0.0.0-20240608151842-d3f834017e53 -> v0.0.0-20251216020129-aea342f6d747
go.opentelemetry.io/auto/sdk v1.1.0 -> v1.2.1
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0 -> v0.65.0
go.opentelemetry.io/otel v1.37.0 -> v1.40.0
go.opentelemetry.io/otel/metric v1.37.0 -> v1.40.0
go.opentelemetry.io/otel/trace v1.37.0 -> v1.40.0
go.step.sm/crypto v0.67.0 -> v0.76.2
go.uber.org/mock v0.5.2 -> v0.6.0
go.uber.org/zap v1.27.0 -> v1.27.1
golang.org/x/crypto v0.40.0 -> v0.48.0
golang.org/x/crypto/x509roots/fallback v0.0.0-20250305170421-49bf5b80c810 -> v0.0.0-20260213171211-a408498e5541
golang.org/x/exp v0.0.0-20250408133849-7e4ce0ab07d0 -> v0.0.0-20251023183803-a4bb9ffd2546
golang.org/x/mod v0.25.0 -> v0.33.0
golang.org/x/net v0.42.0 -> v0.50.0
golang.org/x/oauth2 v0.30.0 -> v0.34.0
golang.org/x/sync v0.16.0 -> v0.19.0
golang.org/x/sys v0.34.0 -> v0.41.0
golang.org/x/term v0.33.0 -> v0.40.0
golang.org/x/text v0.27.0 -> v0.34.0
golang.org/x/time v0.12.0 -> v0.14.0
golang.org/x/tools v0.34.0 -> v0.42.0
google.golang.org/api v0.240.0 -> v0.265.0
google.golang.org/genproto/googleapis/api v0.0.0-20250603155806-513f23925822 -> v0.0.0-20260128011058-8636f8732409
google.golang.org/protobuf v1.36.6 -> v1.36.11

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants