CVE-2026-39858

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's ForwardAuth and snippet-based authentication middleware. Traefik's forwarded-header sanitization logic targets only canonical header names (e.g., X-Forwarded-Proto) and does not strip or normalize alias variants that use underscores instead of dashes (e.g., X_Forwarded_Proto). These unsanitized alias headers are forwarded intact to the authentication backend. When the backend normalizes underscore and dash header forms equivalently, an attacker can inject spoofed trust context — such as a trusted scheme or host — through the alias headers and bypass authentication on protected routes without valid credentials. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:ea1:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:ea2:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:ea3:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:rc1:*:*:*:*:*:*

History

01 May 2026, 17:44

Type Values Removed Values Added
First Time Traefik
Traefik traefik
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 10.0
References () https://github.com/traefik/traefik/releases/tag/v2.11.43 - () https://github.com/traefik/traefik/releases/tag/v2.11.43 - Product, Release Notes
References () https://github.com/traefik/traefik/releases/tag/v3.6.14 - () https://github.com/traefik/traefik/releases/tag/v3.6.14 - Product, Release Notes
References () https://github.com/traefik/traefik/releases/tag/v3.7.0-rc.2 - () https://github.com/traefik/traefik/releases/tag/v3.7.0-rc.2 - Product, Release Notes
References () https://github.com/traefik/traefik/security/advisories/GHSA-5m6w-wvh7-57vm - () https://github.com/traefik/traefik/security/advisories/GHSA-5m6w-wvh7-57vm - Exploit, Mitigation, Patch, Vendor Advisory
CPE cpe:2.3:a:traefik:traefik:3.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:ea3:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:ea2:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:ea1:*:*:*:*:*:*

30 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-30 21:16

Updated : 2026-05-01 17:44


NVD link : CVE-2026-39858

Mitre link : CVE-2026-39858

CVE.ORG link : CVE-2026-39858


JSON object : View

Products Affected

traefik

  • traefik
CWE
CWE-290

Authentication Bypass by Spoofing

CWE-306

Missing Authentication for Critical Function