CVE-2026-39858
Description
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's ForwardAuth and snippet-based authentication middleware. Traefik's forwarded-header sanitization logic targets only canonical header names (e.g., X-Forwarded-Proto) and does not strip or normalize alias variants that use underscores instead of dashes (e.g., X_Forwarded_Proto). These unsanitized alias headers are forwarded intact to the authentication backend. When the backend normalizes underscore and dash header forms equivalently, an attacker can inject spoofed trust context — such as a trusted scheme or host — through the alias headers and bypass authentication on protected routes without valid credentials. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
Single Data Point
Only one EPSS measurement is available for this CVE. Trend analysis requires multiple data points over time.
Authentication Bypass by Spoofing
IncompleteCommon Consequences
Applicable Platforms
Missing Authentication for Critical Function
DraftCommon Consequences
Applicable Platforms
Traefik by Traefik
cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
Traefik by Traefik
cpe:2.3:a:traefik:traefik:3.7.0:ea1:*:*:*:*:*:*
Traefik by Traefik
cpe:2.3:a:traefik:traefik:3.7.0:rc1:*:*:*:*:*:*
Traefik by Traefik
cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
Traefik by Traefik
cpe:2.3:a:traefik:traefik:3.7.0:ea2:*:*:*:*:*:*
Traefik by Traefik
cpe:2.3:a:traefik:traefik:3.7.0:ea3:*:*:*:*:*:*