CVE-2025-54386Path Traversal in Traefik Traefik V2

Severity
7.3HIGHNVD
EPSS
1.0%
top 22.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 2
Latest updateAug 11

Description

Traefik is an HTTP reverse proxy and load balancer. In versions 2.11.27 and below, 3.0.0 through 3.4.4 and 3.5.0-rc1, a path traversal vulnerability was discovered in WASM Traefik’s plugin installation mechanism. By supplying a maliciously crafted ZIP archive containing file paths with ../ sequences, an attacker can overwrite arbitrary files on the system outside of the intended plugin directory. This can lead to remote code execution (RCE), privilege escalation, persistence, or denial of servic

CVSS vector

CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

Affected Packages4 packages

NVDtraefik/traefik3.0.03.4.4+2
Gogithub.com/traefik_traefik_v33.5.0-rc13.5.0+1
CVEListV5traefik/traefik2.11.27, < 2.11.28+2

Patches

🔴Vulnerability Details

4
OSV
Traefik Client Plugin's Path Traversal Vulnerability Allows Arbitrary File Overwrite and Remote Code Execution in github.com/traefik/traefik2025-08-11
CVEList
Traefik's Client Plugin is Vulnerable to Path Traversal, Arbitrary File Overwrites and Remote Code Execution2025-08-01
OSV
Traefik Client Plugin's Path Traversal Vulnerability Allows Arbitrary File Overwrite and Remote Code Execution2025-08-01
GHSA
Traefik Client Plugin's Path Traversal Vulnerability Allows Arbitrary File Overwrite and Remote Code Execution2025-08-01

📋Vendor Advisories

1
Red Hat
traefik: Traefik's Client Plugin is Vulnerable to Path Traversal, Arbitrary File Overwrites and Remote Code Execution2025-08-01
CVE-2025-54386 — Path Traversal in Traefik Traefik V2 | cvebase