SB2026050532 - Multiple vulnerabilities in Traefik
Published: May 5, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) NULL pointer dereference (CVE-ID: CVE-2026-27141)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to a null pointer dereference in the HTTP/2 handling component when processing HTTP/2 frames. A remote attacker can send specially crafted HTTP/2 frames to cause a denial of service.
The vulnerability allows a remote user to redirect traffic for victim hostnames to attacker-controlled backends.
The vulnerability exists due to improper neutralization of special elements in output used by a downstream component in the Kubernetes Gateway provider rule builder when processing tenant-controlled HTTPRoute header or query parameter match values. A remote privileged user can inject backtick-delimited rule tokens into generated router rules to redirect traffic for victim hostnames to attacker-controlled backends.
In shared gateway deployments, the issue can bypass listener hostname constraints and enable cross-tenant routing hijack.
Remediation
Install update from vendor's website.