CVE-2025-32431
April 21, 2025
Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. In versions prior to 2.11.24, 3.3.6, and 3.4.0-rc2. There is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a /../ in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain. This issue has been patched in versions 2.11.24, 3.3.6, and 3.4.0-rc2. A workaround involves adding a "PathRegexp" rule to the matcher to prevent matching a route with a "/../" in the path.
Affected Packages
github.com/traefik/traefik (GO):
Affected version(s) =v3.4.0-rc1 <v3.4.0-rc2Fix Suggestion:
Update to version v3.4.0-rc2github.com/traefik/traefik (GO):
Affected version(s) >=v3.0.0 <v3.3.6Fix Suggestion:
Update to version v3.3.6github.com/traefik/traefik (GO):
Affected version(s) >=v1.0.0-rc1 <v2.11.24Fix Suggestion:
Update to version v2.11.24github.com/traefik/traefik/v2 (GO):
Affected version(s) >=v2.0.0-rc1 <v2.11.23Fix Suggestion:
Update to version v2.11.23github.com/traefik/traefik/v3 (GO):
Affected version(s) >=v3.0.0-beta2.0.20230203142405-044dc6a221a1 <v3.3.6Fix Suggestion:
Update to version v3.3.6github.com/traefik/traefik/v3 (GO):
Affected version(s) >=v3.4.0-rc1 <v3.4.0-rc2Fix Suggestion:
Update to version v3.4.0-rc2Related Resources (7)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.8
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
POC
CVSS v3
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE
Weakness Type (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
EPSS
Base Score:
0.44