Authentication Bypass by Spoofing in Traefik - CVE-2026-39858

 

Authentication Bypass by Spoofing in Traefik - CVE-2026-39858

Published: May 5, 2026


Vulnerability identifier: #VU129676
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2026-39858
CWE-ID: CWE-290
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Traefik
Software vendor:
Containous

Description

The vulnerability allows a remote attacker to bypass authentication and access protected endpoints.

The vulnerability exists due to authentication bypass by spoofing in ForwardAuth and snippet-based authentication middleware when forwarding client-supplied alias forwarded headers to the authentication backend. A remote attacker can send a specially crafted request with spoofed forwarded-header aliases to bypass authentication and access protected endpoints.

Exploitation requires an authentication backend that normalizes underscore and dash header forms equivalently.


Remediation

Install security update from vendor's website.

External links