Improper Neutralization of Special Elements in Output Used by a Downstream Component in Traefik - CVE-2026-32695
Published: May 5, 2026
Traefik
Containous
Description
The vulnerability allows a remote user to bypass host and header routing constraints and redirect unauthorized traffic to victim services.
The vulnerability exists due to improper neutralization of special elements in output used by a downstream component in Traefik Kubernetes Knative provider router rule construction when interpolating user-controlled host or header values into backtick-delimited rule expressions. A remote user can create or update a crafted Knative Ingress resource to bypass host and header routing constraints and redirect unauthorized traffic to victim services.
Exploitation depends on admission or validation policy and on the ability to create or modify Knative Ingress resources in shared or multi-tenant deployments.