VYPR
High severityNVD Advisory· Published Apr 21, 2025· Updated Apr 21, 2025

Traefik has a possible vulnerability with the path matchers

CVE-2025-32431

Description

Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. In versions prior to 2.11.24, 3.3.6, and 3.4.0-rc2. There is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a /../ in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain. This issue has been patched in versions 2.11.24, 3.3.6, and 3.4.0-rc2. A workaround involves adding a PathRegexp rule to the matcher to prevent matching a route with a /../ in the path.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Traefik path normalization flaw allows URL path traversal to bypass middleware chains via /../ sequences.

Vulnerability

Traefik, a popular HTTP reverse proxy and load balancer, contains a path traversal vulnerability in versions prior to 2.11.24, 3.3.6, and 3.4.0-rc2. The issue affects routers using PathPrefix, Path, or PathRegex matchers: when Traefik is configured to route requests to a backend based on a path matcher, a URL containing /../ segments can be normalized, causing the request to be routed to a different backend than intended [1][3].

Exploitation

An attacker can craft an HTTP request with a path like /service/sub-path/../other-path. If the first router expects a path prefix such as /service and a second router expects /service/sub-path, the traversal sequence will cause Traefik to resolve the request to the first router while bypassing any middlewares (e.g., authentication or rate-limiting) that were attached to the second router. The workaround suggested by the vendor is adding a PathRegexp rule to explicitly reject paths containing /../ [3].

Impact

Successful exploitation allows an attacker to reach backend services that should be protected by a middleware chain, effectively bypassing security controls. This could lead to unauthorized access to sensitive functionality or data exposed via those backends.

Mitigation

The vulnerability is fixed in Traefik versions 2.11.24, 3.3.6, and 3.4.0-rc2 [1][3]. Users unable to update immediately should apply the provided workaround: insert a PathRegexp matcher rule to block URLs containing /../ (e.g., !PathRegexp("(?:(/\.\./)+.*)")) into their route definitions.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/traefik/traefikGo
<= 1.7.34
github.com/traefik/traefik/v2Go
< 2.11.232.11.23
github.com/traefik/traefik/v3Go
< 3.3.63.3.6
github.com/traefik/traefik/v3Go
>= 3.4.0-rc1, < 3.4.0-rc23.4.0-rc2

Affected products

7

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.