Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a URL encoded string in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain. This issue has been patched in versions 2.11.25 and 3.4.1.
CVSS
No CVSS.
References
Configurations
No configuration.
History
30 May 2025, 16:31
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 May 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-30 04:15
Updated : 2025-05-30 16:31
NVD link : CVE-2025-47952
Mitre link : CVE-2025-47952
CVE.ORG link : CVE-2025-47952
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')