FKIE_CVE-2026-29054
Vulnerability from fkie_nvd - Published: 2026-03-05 19:16 - Updated: 2026-03-06 15:26
Severity ?
Summary
Traefik is an HTTP reverse proxy and load balancer. From version 2.11.9 to 2.11.37 and from version 3.1.3 to 3.6.8, there is a potential vulnerability in Traefik managing the Connection header with X-Forwarded headers. When Traefik processes HTTP/1.1 requests, the protection put in place to prevent the removal of Traefik-managed X-Forwarded headers (such as X-Real-Ip, X-Forwarded-Host, X-Forwarded-Port, etc.) via the Connection header does not handle case sensitivity correctly. The Connection tokens are compared case-sensitively against the protected header names, but the actual header deletion operates case-insensitively. As a result, a remote unauthenticated client can use lowercase Connection tokens (e.g. Connection: x-real-ip) to bypass the protection and trigger the removal of Traefik-managed forwarded identity headers. This issue has been patched in versions 2.11.38 and 3.6.9.
References
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/traefik/traefik/releases/tag/v2.11.38 | Product, Release Notes | |
| security-advisories@github.com | https://github.com/traefik/traefik/releases/tag/v3.6.9 | Product, Release Notes | |
| security-advisories@github.com | https://github.com/traefik/traefik/security/advisories/GHSA-92mv-8f8w-wq52 | Patch, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEECE25-1AC0-4A93-8CA9-3C1AEBF85E86",
"versionEndExcluding": "2.11.38",
"versionStartIncluding": "2.11.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07558342-0979-427E-A153-610F1B378CD6",
"versionEndExcluding": "3.6.9",
"versionStartIncluding": "3.1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Traefik is an HTTP reverse proxy and load balancer. From version 2.11.9 to 2.11.37 and from version 3.1.3 to 3.6.8, there is a potential vulnerability in Traefik managing the Connection header with X-Forwarded headers. When Traefik processes HTTP/1.1 requests, the protection put in place to prevent the removal of Traefik-managed X-Forwarded headers (such as X-Real-Ip, X-Forwarded-Host, X-Forwarded-Port, etc.) via the Connection header does not handle case sensitivity correctly. The Connection tokens are compared case-sensitively against the protected header names, but the actual header deletion operates case-insensitively. As a result, a remote unauthenticated client can use lowercase Connection tokens (e.g. Connection: x-real-ip) to bypass the protection and trigger the removal of Traefik-managed forwarded identity headers. This issue has been patched in versions 2.11.38 and 3.6.9."
},
{
"lang": "es",
"value": "Traefik es un proxy inverso HTTP y un equilibrador de carga. Desde la versi\u00f3n 2.11.9 hasta la 2.11.37 y desde la versi\u00f3n 3.1.3 hasta la 3.6.8, existe una potencial vulnerabilidad en Traefik al gestionar el encabezado Connection con los encabezados X-Forwarded. Cuando Traefik procesa solicitudes HTTP/1.1, la protecci\u00f3n implementada para evitar la eliminaci\u00f3n de los encabezados X-Forwarded gestionados por Traefik (como X-Real-Ip, X-Forwarded-Host, X-Forwarded-Port, etc.) a trav\u00e9s del encabezado Connection no maneja correctamente la distinci\u00f3n entre may\u00fasculas y min\u00fasculas. Los tokens de Connection se comparan con distinci\u00f3n entre may\u00fasculas y min\u00fasculas con los nombres de los encabezados protegidos, pero la eliminaci\u00f3n real del encabezado opera sin distinci\u00f3n entre may\u00fasculas y min\u00fasculas. Como resultado, un cliente remoto no autenticado puede usar tokens de Connection en min\u00fasculas (p. ej., Connection: x-real-ip) para eludir la protecci\u00f3n y activar la eliminaci\u00f3n de los encabezados de identidad reenviados gestionados por Traefik. Este problema ha sido parcheado en las versiones 2.11.38 y 3.6.9."
}
],
"id": "CVE-2026-29054",
"lastModified": "2026-03-06T15:26:20.060",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-03-05T19:16:15.277",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Product",
"Release Notes"
],
"url": "https://github.com/traefik/traefik/releases/tag/v2.11.38"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product",
"Release Notes"
],
"url": "https://github.com/traefik/traefik/releases/tag/v3.6.9"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-92mv-8f8w-wq52"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-178"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…