Affected by GO-2025-4205
and 14 other vulnerabilities
GO-2025-4205: Traefik Inverted TLS Verification Logic in ingress-nginx Provider in github.com/traefik/traefik
GO-2025-4206: Path Normalization Bypass in Traefik Router + Middleware Rules in github.com/traefik/traefik
GO-2026-4322: Traefik's ACME TLS-ALPN fast path lacks timeouts and close on handshake stall in github.com/traefik/traefik
GO-2026-4484: Traefik: TCP readTimeout bypass via STARTTLS on Postgres in github.com/traefik/traefik
GO-2026-4530: Traefik affected by TLS ClientAuth Bypass on HTTP/3 in github.com/traefik/traefik
GO-2026-4593: Traefik has unbounded io.ReadAll on auth server response body that causes OOM DOS in github.com/traefik/traefik
GO-2026-4594: Traefik: tcp router clears read deadlines before tls forwarding, enabling stalled handshakes (Slowloris DOS) in github.com/traefik/traefik
GO-2026-4597: traefik CVE-2024-45410 fix bypass: lowercase `Connection` tokens can delete traefik-managed forwarded identity headers (for example, `X-Real-Ip`) in github.com/traefik/traefik
GO-2026-4679: Traefik: kubernetes gateway rule injection via unescaped backticks in HTTPRoute match values in github.com/traefik/traefik
GO-2026-4684: Traefik: HTTP/2 frames can cause a running server to panic in github.com/traefik/traefik
GO-2026-4792: Traefik Affected by BasicAuth Middleware Timing Attack Allows Username Enumeration in github.com/traefik/traefik
GO-2026-4793: Traefik has a Potential mTLS Bypass via Fragmented TLS ClientHello Causing Pre-SNI Sniff Fallback to Default Non-mTLS TLS Config in github.com/traefik/traefik
GO-2026-4880: Traefik has Knative Ingress Rule Injection that Allows Host Restriction Bypass in github.com/traefik/traefik
GO-2026-4893: Traefik Vulnerable to BasicAuth/DigestAuth Identity Spoofing via Non-Canonical headerField in github.com/traefik/traefik
GO-2026-4897: Traefik: Deny Rule Bypass via Unauthenticated Malicious gRPC Requests in gRPC-Go Dependency (CVE-2026-33186) in github.com/traefik/traefik