SB2025052961 - Multiple vulnerabilities in Traefik
Published: May 29, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2025-32431)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within the requests using a PathPrefix, Path or PathRegex matcher. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.
2) Path traversal (CVE-ID: CVE-2025-47952)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within the requests using a PathPrefix, Path or PathRegex matcher. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.
Remediation
Install update from vendor's website.
References
- https://github.com/traefik/traefik/pull/11684
- https://github.com/traefik/traefik/releases/tag/v2.11.24
- https://github.com/traefik/traefik/releases/tag/v3.3.6
- https://github.com/traefik/traefik/releases/tag/v3.4.0-rc2
- https://github.com/traefik/traefik/security/advisories/GHSA-6p68-w45g-48j7
- https://github.com/advisories/GHSA-vrch-868g-9jx5