Critical severity10.0NVD Advisory· Published Apr 30, 2026· Updated May 1, 2026
CVE-2026-35051
CVE-2026-35051
Description
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is an authentication bypass vulnerability in Traefik's ForwardAuth middleware when trustForwardHeader=false is configured and Traefik is deployed behind a trusted upstream proxy. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/traefik/traefik/v3Go | >= 3.7.0-ea.1, < 3.7.0-rc.2 | 3.7.0-rc.2 |
github.com/traefik/traefik/v3Go | >= 3.0.0-beta1, < 3.6.14 | 3.6.14 |
github.com/traefik/traefik/v2Go | < 2.11.43 | 2.11.43 |
github.com/traefik/traefikGo | <= 1.7.34 | — |
Affected products
5cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*range: <2.11.43
- cpe:2.3:a:traefik:traefik:3.7.0:ea1:*:*:*:*:*:*
- cpe:2.3:a:traefik:traefik:3.7.0:ea2:*:*:*:*:*:*
- cpe:2.3:a:traefik:traefik:3.7.0:ea3:*:*:*:*:*:*
- cpe:2.3:a:traefik:traefik:3.7.0:rc1:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/traefik/traefik/security/advisories/GHSA-6384-m2mw-rf54nvdExploitPatchVendor AdvisoryWEB
- github.com/advisories/GHSA-6384-m2mw-rf54ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-35051ghsaADVISORY
- github.com/traefik/traefik/releases/tag/v2.11.43nvdProductRelease NotesWEB
- github.com/traefik/traefik/releases/tag/v3.6.14nvdProductRelease NotesWEB
- github.com/traefik/traefik/releases/tag/v3.7.0-rc.2nvdProductRelease NotesWEB
News mentions
0No linked articles in our index yet.