CVE-2025-47952
- EPSS 0.4%
- Veröffentlicht 30.05.2025 03:37:12
- Zuletzt bearbeitet 25.11.2025 15:10:59
Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configure...
CVE-2025-32431
- EPSS 0.44%
- Veröffentlicht 21.04.2025 15:34:04
- Zuletzt bearbeitet 25.11.2025 15:13:09
Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. In versions prior to 2.11.24, 3.3.6, and 3.4.0-rc2. There is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traef...
CVE-2024-52003
- EPSS 0.24%
- Veröffentlicht 29.11.2024 19:15:08
- Zuletzt bearbeitet 25.11.2025 13:48:57
Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. There is a vulnerability in Traefik that allows the client to provide the X-Forwarded-Prefix header from an untrusted source. This issue has been addressed in versions 2.11.14 a...
CVE-2024-45410
- EPSS 13.95%
- Veröffentlicht 19.09.2024 23:15:11
- Zuletzt bearbeitet 25.09.2024 17:39:08
Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP clien...
CVE-2024-39321
- EPSS 0.18%
- Veröffentlicht 05.07.2024 18:15:32
- Zuletzt bearbeitet 25.11.2025 14:08:47
Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versi...
CVE-2024-28869
- EPSS 1.02%
- Veröffentlicht 12.04.2024 22:15:07
- Zuletzt bearbeitet 26.11.2025 13:12:13
Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to any Traefik endpoint with the "Content-length" request header results in an indefinite hang with the default configuration. This vulnerability can be ex...
CVE-2023-47633
- EPSS 0.83%
- Veröffentlicht 04.12.2023 21:15:34
- Zuletzt bearbeitet 21.11.2024 08:30:34
Traefik is an open source HTTP reverse proxy and load balancer. The traefik docker container uses 100% CPU when it serves as its own backend, which is an automatically generated route resulting from the Docker integration in the default configuration...
CVE-2023-47124
- EPSS 0.23%
- Veröffentlicht 04.12.2023 21:15:33
- Zuletzt bearbeitet 21.11.2024 08:29:49
Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited ...
CVE-2023-47106
- EPSS 0.13%
- Veröffentlicht 04.12.2023 21:15:33
- Zuletzt bearbeitet 21.11.2024 08:29:47
Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-for...
CVE-2023-44487
- EPSS 94.4%
- Veröffentlicht 10.10.2023 14:15:10
- Zuletzt bearbeitet 12.05.2026 15:10:32
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.