VYPR
Moderate severityNVD Advisory· Published Mar 11, 2026· Updated Mar 11, 2026

Traefik has a kubernetes gateway rule injection via unescaped backticks in HTTPRoute match values

CVE-2026-29777

Description

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled backends. This vulnerability is fixed in 3.6.10.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/traefik/traefik/v3Go
< 3.6.103.6.10
github.com/traefik/traefikGo
<= 1.7.34
github.com/traefik/traefik/v2Go
<= 2.11.40

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.