VYPR
Moderate severityNVD Advisory· Published Dec 4, 2023· Updated Aug 2, 2024

Incorrect processing of fragment in the URL leads to Authorization Bypass in Traefik

CVE-2023-47106

Description

Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-form the URL should only contain the absolute path and the query. When this is combined with another frontend proxy like Nginx, it can be used to bypass frontend proxy URI-based access control restrictions. This vulnerability has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Traefik URL-encodes and forwards URL fragments to backends, violating RFC 7230 and enabling access-control bypass when paired with frontend proxies like Nginx.

Vulnerability

Overview

CVE-2023-47106 describes a vulnerability in Traefik, an open-source HTTP reverse proxy and load balancer [2]. When Traefik receives a request containing a URL fragment (the part of a URI after #), it automatically URL-encodes and forwards that fragment to the backend server. This behavior violates RFC 7230 Section 5.3.1, which specifies that in origin-form, the request target should only contain the absolute path and query parameters, not the fragment [1].

Attack

Scenario

An attacker can exploit this by crafting a request with a URL fragment that, when passed through a frontend proxy such as Nginx, bypasses URI-based access control restrictions enforced by that frontend proxy [2]. For example, if Nginx is configured to block access to certain paths but does not strip fragments, Traefik's forwarding of the fragment may cause the backend to interpret the request differently, circumventing the intended restriction.

Impact

Successful exploitation allows an attacker to bypass access control policies set by a frontend proxy, gaining unauthorized access to protected resources or endpoints [2]. The impact is contingent on the presence of another frontend proxy that performs URI-based access control without properly handling fragments.

Mitigation

The vulnerability has been addressed in Traefik versions 2.10.6 and 3.0.0-beta5 [4]. Users are advised to upgrade to these or later versions. No known workarounds exist, making patching the only reliable mitigation [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/traefik/traefik/v2Go
< 2.10.62.10.6
github.com/traefik/traefik/v3Go
< 3.0.0-beta53.0.0-beta5

Affected products

8

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.