VYPR
Critical severity10.0NVD Advisory· Published Apr 30, 2026· Updated May 1, 2026

CVE-2026-39858

CVE-2026-39858

Description

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's ForwardAuth and snippet-based authentication middleware. Traefik's forwarded-header sanitization logic targets only canonical header names (e.g., X-Forwarded-Proto) and does not strip or normalize alias variants that use underscores instead of dashes (e.g., X_Forwarded_Proto). These unsanitized alias headers are forwarded intact to the authentication backend. When the backend normalizes underscore and dash header forms equivalently, an attacker can inject spoofed trust context — such as a trusted scheme or host — through the alias headers and bypass authentication on protected routes without valid credentials. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/traefik/traefik/v3Go
>= 3.7.0-ea.1, < 3.7.0-rc.23.7.0-rc.2
github.com/traefik/traefik/v3Go
>= 3.0.0-beta1, < 3.6.143.6.14
github.com/traefik/traefik/v2Go
< 2.11.432.11.43
github.com/traefik/traefikGo
<= 1.7.34

Affected products

5
  • Traefik/Traefik5 versions
    cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*range: <2.11.43
    • cpe:2.3:a:traefik:traefik:3.7.0:ea1:*:*:*:*:*:*
    • cpe:2.3:a:traefik:traefik:3.7.0:ea2:*:*:*:*:*:*
    • cpe:2.3:a:traefik:traefik:3.7.0:ea3:*:*:*:*:*:*
    • cpe:2.3:a:traefik:traefik:3.7.0:rc1:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.