Incorrect processing of fragment in the URL leads to Authorization Bypass in Traefik
Description
Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-form the URL should only contain the absolute path and the query. When this is combined with another frontend proxy like Nginx, it can be used to bypass frontend proxy URI-based access control restrictions. This vulnerability has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Traefik URL-encodes and forwards URL fragments to backends, violating RFC 7230 and enabling access-control bypass when paired with frontend proxies like Nginx.
Vulnerability
Overview
CVE-2023-47106 describes a vulnerability in Traefik, an open-source HTTP reverse proxy and load balancer [2]. When Traefik receives a request containing a URL fragment (the part of a URI after #), it automatically URL-encodes and forwards that fragment to the backend server. This behavior violates RFC 7230 Section 5.3.1, which specifies that in origin-form, the request target should only contain the absolute path and query parameters, not the fragment [1].
Attack
Scenario
An attacker can exploit this by crafting a request with a URL fragment that, when passed through a frontend proxy such as Nginx, bypasses URI-based access control restrictions enforced by that frontend proxy [2]. For example, if Nginx is configured to block access to certain paths but does not strip fragments, Traefik's forwarding of the fragment may cause the backend to interpret the request differently, circumventing the intended restriction.
Impact
Successful exploitation allows an attacker to bypass access control policies set by a frontend proxy, gaining unauthorized access to protected resources or endpoints [2]. The impact is contingent on the presence of another frontend proxy that performs URI-based access control without properly handling fragments.
Mitigation
The vulnerability has been addressed in Traefik versions 2.10.6 and 3.0.0-beta5 [4]. Users are advised to upgrade to these or later versions. No known workarounds exist, making patching the only reliable mitigation [2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/traefik/traefik/v2Go | < 2.10.6 | 2.10.6 |
github.com/traefik/traefik/v3Go | < 3.0.0-beta5 | 3.0.0-beta5 |
Affected products
8- osv-coords7 versionspkg:apk/chainguard/traefikpkg:apk/chainguard/traefik-fipspkg:apk/wolfi/traefikpkg:golang/github.com/traefik/traefik/v2pkg:golang/github.com/traefik/traefik/v3pkg:rpm/opensuse/traefik2&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/traefik&distro=openSUSE%20Tumbleweed
< 2.10.6-r0+ 6 more
- (no CPE)range: < 2.10.6-r0
- (no CPE)range: < 0
- (no CPE)range: < 2.10.6-r0
- (no CPE)range: < 2.10.6
- (no CPE)range: < 3.0.0-beta5
- (no CPE)range: < 2.11.5-1.1
- (no CPE)range: < 2.10.7-1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-fvhj-4qfh-q2hmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-47106ghsaADVISORY
- datatracker.ietf.org/doc/html/rfc7230ghsax_refsource_MISCWEB
- github.com/traefik/traefik/releases/tag/v2.10.6ghsax_refsource_MISCWEB
- github.com/traefik/traefik/releases/tag/v3.0.0-beta5ghsax_refsource_MISCWEB
- github.com/traefik/traefik/security/advisories/GHSA-fvhj-4qfh-q2hmghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.