Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's ForwardAuth and snippet-based authentication middleware. Traefik's forwarded-header sanitization logic targets only canonical header names (e.g., X-Forwarded-Proto) and does not strip or normalize alias variants that use underscores instead of dashes (e.g., X_Forwarded_Proto). These unsanitized alias headers are forwarded intact to the authentication backend. When the backend normalizes underscore and dash header forms equivalently, an attacker can inject spoofed trust context — such as a trusted scheme or host — through the alias headers and bypass authentication on protected routes without valid credentials. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.
References
| Link | Resource |
|---|---|
| https://github.com/traefik/traefik/releases/tag/v2.11.43 | Product Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.6.14 | Product Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.7.0-rc.2 | Product Release Notes |
| https://github.com/traefik/traefik/security/advisories/GHSA-5m6w-wvh7-57vm | Exploit Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
01 May 2026, 17:44
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Traefik
Traefik traefik |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
| References | () https://github.com/traefik/traefik/releases/tag/v2.11.43 - Product, Release Notes | |
| References | () https://github.com/traefik/traefik/releases/tag/v3.6.14 - Product, Release Notes | |
| References | () https://github.com/traefik/traefik/releases/tag/v3.7.0-rc.2 - Product, Release Notes | |
| References | () https://github.com/traefik/traefik/security/advisories/GHSA-5m6w-wvh7-57vm - Exploit, Mitigation, Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:traefik:traefik:3.7.0:rc1:*:*:*:*:*:* cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:* cpe:2.3:a:traefik:traefik:3.7.0:ea3:*:*:*:*:*:* cpe:2.3:a:traefik:traefik:3.7.0:ea2:*:*:*:*:*:* cpe:2.3:a:traefik:traefik:3.7.0:ea1:*:*:*:*:*:* |
30 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-30 21:16
Updated : 2026-05-01 17:44
NVD link : CVE-2026-39858
Mitre link : CVE-2026-39858
CVE.ORG link : CVE-2026-39858
JSON object : View
Products Affected
traefik
- traefik
