Home

Description

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled backends. This vulnerability is fixed in 3.6.10.

PUBLISHED Reserved 2026-03-04 | Published 2026-03-11 | Updated 2026-03-11 | Assigner GitHub_M




MEDIUM: 6.1CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Product status

< 3.6.10
affected

References

github.com/...raefik/security/advisories/GHSA-8q2w-wr49-whqj

github.com/traefik/traefik/releases/tag/v3.6.10

cve.org (CVE-2026-29777)

nvd.nist.gov (CVE-2026-29777)

Download JSON