Traefik vulnerabilities

34 known vulnerabilities affecting traefik/traefik.

Total CVEs
34
CISA KEV
1
actively exploited
Public exploits
2
Exploited in wild
1
Severity breakdown
HIGH20MEDIUM13LOW1

Vulnerabilities

Page 1 of 2
CVE-2026-33433MEDIUMCVSS 5.1fixed in 2.11.42≥ 3.0.0, < 3.6.12+3 more2026-03-27
CVE-2026-33433 [MEDIUM] CWE-290 CVE-2026-33433: Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.42, 3.6.11, and 3.7.0-ea. Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.42, 3.6.11, and 3.7.0-ea.3, when `headerField` is configured with a non-canonical HTTP header name (e.g., `x-auth-user` instead of `X-Auth-User`), an authenticated attacker can inject their own canonical version of that header to impersonate any identity to the backend. The b
cvelistv5nvd
CVE-2026-32695MEDIUMCVSS 6.3fixed in 3.6.11v3.7.0+1 more2026-03-27
CVE-2026-32695 [MEDIUM] CWE-74 CVE-2026-32695: Traefik is an HTTP reverse proxy and load balancer. Prior to versions 3.6.11 and 3.7.0-ea.2, Traefik Traefik is an HTTP reverse proxy and load balancer. Prior to versions 3.6.11 and 3.7.0-ea.2, Traefik's Knative provider builds router rules by interpolating user-controlled values into backtick-delimited rule expressions without escaping. In live cluster validation, Knative `rules[].hosts[]` was exploitable for host restriction bypass (for example `t
cvelistv5nvd
CVE-2026-32305HIGHCVSS 7.8fixed in 2.11.41≥ 3.0.0, ≤ 3.6.11+3 more2026-03-20
CVE-2026-32305 [HIGH] CWE-287 CVE-2026-32305: Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through 3.6.11, and 3.7.0-ea.1 are vulnerable to mTLS bypass through the TLS SNI pre-sniffing logic related to fragmented ClientHello packets. When a TLS ClientHello is fragmented across multiple records, Traefik's SNI extraction may fail with an EOF and return
cvelistv5nvd
CVE-2026-32595MEDIUMCVSS 6.3fixed in 2.11.41≥ 3.0.0, ≤ 3.6.11+3 more2026-03-20
CVE-2026-32595 [MEDIUM] CWE-208 CVE-2026-32595: Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through 3.6.11, and 3.7.0-ea.1 comtain BasicAuth middleware that allows username enumeration via a timing attack. When a submitted username exists, the middleware performs a bcrypt password comparison taking ~166ms. When the username does not exist, the respon
cvelistv5nvd
CVE-2026-29777MEDIUMCVSS 6.1fixed in 3.6.102026-03-11
CVE-2026-29777 [MEDIUM] CWE-74 CVE-2026-29777: Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to a Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic
cvelistv5nvd
CVE-2026-29054HIGHCVSS 7.5≥ 2.11.9, < 2.11.38≥ 3.1.3, < 3.6.9+2 more2026-03-05
CVE-2026-29054 [HIGH] CWE-178 CVE-2026-29054: Traefik is an HTTP reverse proxy and load balancer. From version 2.11.9 to 2.11.37 and from version Traefik is an HTTP reverse proxy and load balancer. From version 2.11.9 to 2.11.37 and from version 3.1.3 to 3.6.8, there is a potential vulnerability in Traefik managing the Connection header with X-Forwarded headers. When Traefik processes HTTP/1.1 requests, the protection put in place to prevent the removal of Traefik-managed X-Forwarded headers (su
cvelistv5nvd
CVE-2026-26999HIGHCVSS 7.5fixed in 2.11.38≥ 3.0.0, < 3.6.9+1 more2026-03-05
CVE-2026-26999 [HIGH] CWE-400 CVE-2026-26999: Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing TLS handshake on TCP routers. When Traefik processes a TLS connection on a TCP router, the read deadline used to bound protocol sniffing is cleared before the TLS handshake is completed. When a TLS handshake re
cvelistv5nvd
CVE-2026-26998MEDIUMCVSS 4.4fixed in 2.11.38≥ 3.0.0, < 3.6.9+1 more2026-03-05
CVE-2026-26998 [MEDIUM] CWE-770 CVE-2026-26998: Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing the ForwardAuth middleware responses. When Traefik is configured to use the ForwardAuth middleware, the response body from the authentication server is read entirely into memory without any size limit. There
cvelistv5nvd
CVE-2026-25949HIGHCVSS 7.5fixed in 3.6.82026-02-12
CVE-2026-25949 [HIGH] CWE-400 CVE-2026-25949: Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerabili Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint respondingTimeouts.readTimeout by sending the 8-byte Postgres SSLRequest (STARTTLS) prelude and then stalling, causing connections to remain open indefinit
cvelistv5nvd
CVE-2026-22045HIGHCVSS 7.5fixed in 2.11.35≥ 3.0.0, < 3.6.7+1 more2026-01-15
CVE-2026-22045 [HIGH] CWE-770 CVE-2026-22045: Traefik is an HTTP reverse proxy and load balancer. Prior to 2.11.35 and 3.6.7, there is a potential Traefik is an HTTP reverse proxy and load balancer. Prior to 2.11.35 and 3.6.7, there is a potential vulnerability in Traefik ACME TLS certificates' automatic generation: the ACME TLS-ALPN fast path can allow unauthenticated clients to tie up go routines and file descriptors indefinitely when the ACME TLS challenge is enabled. A malicious client can o
cvelistv5nvd
CVE-2025-66490MEDIUMCVSS 6.9fixed in 2.11.32≥ 3.0.0, < 3.6.3+3 more2025-12-09
CVE-2025-66490 [MEDIUM] CWE-436 CVE-2025-66490: Traefik is an HTTP reverse proxy and load balancer. For versions prior to 2.11.32 and 2.11.31 throug Traefik is an HTTP reverse proxy and load balancer. For versions prior to 2.11.32 and 2.11.31 through 3.6.2, requests using PathPrefix, Path or PathRegex matchers can bypass path normalization. When Traefik uses path-based routing, requests containing URL-encoded restricted characters (/, \, Null, ;, ?, #) can bypass the middleware chain and reach u
cvelistv5nvd
CVE-2025-66491MEDIUMCVSS 5.9≥ 3.5.0, < 3.6.3v>= 3.5.0, < 3.6.32025-12-09
CVE-2025-66491 [MEDIUM] CWE-295 CVE-2025-66491: Traefik is an HTTP reverse proxy and load balancer. Versions 3.5.0 through 3.6.2 have inverted TLS v Traefik is an HTTP reverse proxy and load balancer. Versions 3.5.0 through 3.6.2 have inverted TLS verification logic in the nginx.ingress.kubernetes.io/proxy-ssl-verify annotation. Setting the annotation to "on" (intending to enable backend TLS certificate verification) actually disables verification, allowing man-in-the-middle attacks against HTTP
cvelistv5nvd
CVE-2025-54386HIGHCVSS 7.3fixed in 2.11.7≥ 3.0.0, < 3.4.4+3 more2025-08-02
CVE-2025-54386 [HIGH] CWE-22 CVE-2025-54386: Traefik is an HTTP reverse proxy and load balancer. In versions 2.11.27 and below, 3.0.0 through 3.4 Traefik is an HTTP reverse proxy and load balancer. In versions 2.11.27 and below, 3.0.0 through 3.4.4 and 3.5.0-rc1, a path traversal vulnerability was discovered in WASM Traefik’s plugin installation mechanism. By supplying a maliciously crafted ZIP archive containing file paths with ../ sequences, an attacker can overwrite arbitrary files on the sys
cvelistv5nvd
CVE-2025-47952LOWCVSS 2.9fixed in 2.11.25≥ 3.0.0, < 3.4.1+1 more2025-05-30
CVE-2025-47952 [LOW] CWE-22 CVE-2025-47952: Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 a Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a URL encoded
cvelistv5nvd
CVE-2025-32431HIGHCVSS 8.8fixed in 2.11.24≥ 3.0.0, < 3.3.6+3 more2025-04-21
CVE-2025-32431 [HIGH] CWE-22 CVE-2025-32431: Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. In versions prior to 2.11.2 Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. In versions prior to 2.11.24, 3.3.6, and 3.4.0-rc2. There is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contai
cvelistv5nvd
CVE-2024-52003MEDIUMCVSS 6.3fixed in 2.11.14≥ 3.0.0, < 3.2.1+1 more2024-11-29
CVE-2024-52003 [MEDIUM] CWE-601 CVE-2024-52003: Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. There is a vulnerability in Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. There is a vulnerability in Traefik that allows the client to provide the X-Forwarded-Prefix header from an untrusted source. This issue has been addressed in versions 2.11.14 and 3.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
cvelistv5nvd
CVE-2024-45410HIGHCVSS 7.5fixed in 2.11.9≥ 3.0.0, < 3.1.3+1 more2024-09-19
CVE-2024-45410 [HIGH] CWE-345 CVE-2024-45410: Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, ce Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP client, it should not be possible to remove or modify these headers. Since the application trusts the value
cvelistv5nvd
CVE-2024-39321HIGHCVSS 7.5fixed in 2.11.6≥ 3.0.0, < 3.0.4+3 more2024-07-05
CVE-2024-39321 [HIGH] CWE-639 CVE-2024-39321: Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 h Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.
cvelistv5nvd
CVE-2024-28869HIGHCVSS 7.5fixed in 2.11.2v3.0.0+1 more2024-04-12
CVE-2024-28869 [HIGH] CWE-755 CVE-2024-28869: Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to an Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to any Traefik endpoint with the "Content-length" request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of service. This vulnerability has been addressed in version 2.
cvelistv5nvd
CVE-2023-47633HIGHCVSS 7.5≤ 2.10.5v3.0.0+2 more2023-12-04
CVE-2023-47633 [HIGH] CWE-400 CVE-2023-47633: Traefik is an open source HTTP reverse proxy and load balancer. The traefik docker container uses 10 Traefik is an open source HTTP reverse proxy and load balancer. The traefik docker container uses 100% CPU when it serves as its own backend, which is an automatically generated route resulting from the Docker integration in the default configuration. This issue has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There
cvelistv5nvd