Path traversal in Traefik - CVE-2025-54386
Published: May 5, 2026
Traefik
Containous
Description
The vulnerability allows a remote user to overwrite arbitrary files and execute arbitrary code.
The vulnerability exists due to path traversal in the unzipFile function in /plugins/client.go when extracting a crafted WASM plugin ZIP archive. A remote privileged user can supply a malicious ZIP archive containing ../ sequences to overwrite arbitrary files and execute arbitrary code.
Exploitation requires plugins to be enabled and a WASM plugin asset loaded by the server, and user interaction is required.