mTLS Bypass Vulnerability in Traefik HTTP Reverse Proxy and Load Balancer
CVE-2026-32305

7.8HIGH

Key Information:

Vendor

Traefik

Status
Vendor
CVE Published:
20 March 2026

What is CVE-2026-32305?

The mTLS bypass vulnerability in Traefik arises from its handling of fragmented ClientHello packets. When packets are split, Traefik may fail to extract the SNI, leading to a default TLS configuration that doesn't enforce mutual TLS authentication. Consequently, attackers can exploit this vulnerability to access services intended to be protected by client certificate verification. This issue has been addressed in the latest versions, ensuring enhanced security and integrity of the traffic routing.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

traefik < 2.11.41 < 2.11.41

traefik >= 3.0.0-beta1, < 3.6.11 < 3.0.0-beta1, 3.6.11

traefik >= 3.7.0-ea.1, < 3.7.0-ea.2 < 3.7.0-ea.1, 3.7.0-ea.2

References

CVSS V4

Score:
7.8
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.