Authentication Bypass by Primary Weakness in Traefik - CVE-2026-32305
Published: May 5, 2026
Traefik
Containous
Description
The vulnerability allows a remote attacker to bypass mutual TLS authentication and access services protected by route-level mTLS.
The vulnerability exists due to improper security decision based on incomplete input in TLS SNI pre-sniffing logic when processing fragmented TLS ClientHello records. A remote attacker can send a specially crafted fragmented ClientHello to bypass mutual TLS authentication and access services protected by route-level mTLS.
Exploitation requires route-level TLS options to enforce mTLS for a host while the default TLS configuration is weaker and pre-sniff SNI extraction fails with an empty SNI.