Authentication Bypass Vulnerability in Traefik HTTP Reverse Proxy and Load Balancer
CVE-2026-39858

7.8HIGH

Key Information:

Vendor

Traefik

Status
Vendor
CVE Published:
30 April 2026

What is CVE-2026-39858?

Traefik, a popular HTTP reverse proxy and load balancer, suffers from an authentication bypass vulnerability due to flawed header sanitization logic in its ForwardAuth and snippet-based authentication middleware. The vulnerability arises when Traefik processes headers with underscore variants (e.g., X_Forwarded_Proto) without proper normalization, allowing attackers to manipulate these headers and potentially spoof trusted contexts. This oversight enables bypassing authentication and gaining unauthorized access to protected routes, making it crucial for users to upgrade to the patched versions (2.11.43, 3.6.14, 3.7.0-rc.2) to mitigate these risks.

Affected Version(s)

traefik < 2.11.43 < 2.11.43

traefik >= 3.0.0-beta1, < 3.6.14 < 3.0.0-beta1, 3.6.14

traefik >= 3.7.0-ea.1, < 3.7.0-rc.2 < 3.7.0-ea.1, 3.7.0-rc.2

References

CVSS V4

Score:
7.8
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.