Home

Description

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint respondingTimeouts.readTimeout by sending the 8-byte Postgres SSLRequest (STARTTLS) prelude and then stalling, causing connections to remain open indefinitely, leading to a denial of service. This vulnerability is fixed in 3.6.8.

PUBLISHED Reserved 2026-02-09 | Published 2026-02-12 | Updated 2026-02-12 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-400: Uncontrolled Resource Consumption

Product status

< 3.6.8
affected

References

github.com/...raefik/security/advisories/GHSA-89p3-4642-cr2w

github.com/...ommit/31e566e9f1d7888ccb6fbc18bfed427203c35678

github.com/traefik/traefik/releases/tag/v3.6.8

cve.org (CVE-2026-25949)

nvd.nist.gov (CVE-2026-25949)

Download JSON