CVE-2025-54386
- EPSS 0.89%
- Published 01.08.2025 23:32:21
- Last modified 04.08.2025 15:06:15
Traefik is an HTTP reverse proxy and load balancer. In versions 2.11.27 and below, 3.0.0 through 3.4.4 and 3.5.0-rc1, a path traversal vulnerability was discovered in WASM Traefik’s plugin installation mechanism. By supplying a maliciously crafted ZI...
CVE-2025-47952
- EPSS 0.03%
- Published 30.05.2025 03:37:12
- Last modified 30.05.2025 16:31:03
Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configure...
CVE-2025-32431
- EPSS 0.04%
- Published 21.04.2025 15:34:04
- Last modified 23.04.2025 14:08:13
Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. In versions prior to 2.11.24, 3.3.6, and 3.4.0-rc2. There is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traef...
CVE-2024-52003
- EPSS 0.19%
- Published 29.11.2024 19:15:08
- Last modified 29.11.2024 19:15:08
Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. There is a vulnerability in Traefik that allows the client to provide the X-Forwarded-Prefix header from an untrusted source. This issue has been addressed in versions 2.11.14 a...
CVE-2024-45410
- EPSS 4.63%
- Published 19.09.2024 23:15:11
- Last modified 25.09.2024 17:39:08
Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP clien...
CVE-2024-39321
- EPSS 0.05%
- Published 05.07.2024 18:15:32
- Last modified 21.11.2024 09:27:27
Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versi...
CVE-2024-28869
- EPSS 0.13%
- Published 12.04.2024 22:15:07
- Last modified 21.11.2024 09:07:04
Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to any Traefik endpoint with the "Content-length" request header results in an indefinite hang with the default configuration. This vulnerability can be ex...
CVE-2023-47633
- EPSS 0.64%
- Published 04.12.2023 21:15:34
- Last modified 21.11.2024 08:30:34
Traefik is an open source HTTP reverse proxy and load balancer. The traefik docker container uses 100% CPU when it serves as its own backend, which is an automatically generated route resulting from the Docker integration in the default configuration...
CVE-2023-47124
- EPSS 0.13%
- Published 04.12.2023 21:15:33
- Last modified 21.11.2024 08:29:49
Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited ...
CVE-2023-47106
- EPSS 0.1%
- Published 04.12.2023 21:15:33
- Last modified 21.11.2024 08:29:47
Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-for...