<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Traefik — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/traefik/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 15:37:47 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/traefik/feed.xml" rel="self" type="application/rss+xml"/><item><title>Traefik gRPC Deny Rule Bypass Vulnerability (CVE-2026-33186)</title><link>https://feed.craftedsignal.io/briefs/2026-04-traefik-grpc-bypass/</link><pubDate>Sun, 29 Mar 2026 15:37:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-traefik-grpc-bypass/</guid><description>A remote, unauthenticated attacker can bypass Traefik deny rules by sending malformed gRPC requests with a missing leading slash in the `:path` pseudo-header, exploiting a vulnerability in the gRPC-Go dependency, leading to unauthorized access if a fallback "allow" rule is configured.</description><content:encoded><![CDATA[<p>Traefik, a popular reverse proxy and load balancer, is susceptible to a denial rule bypass (CVE-2026-33186) due to a flaw in its gRPC-Go dependency. This vulnerability affects Traefik versions prior to 2.11.42, versions 3.0.0-beta3 through 3.6.11, and versions 3.7.0-ea.1 through 3.7.0-ea.3. An unauthenticated attacker can exploit this by sending gRPC requests with a malformed HTTP/2 <code>:path</code> pseudo-header that omits the leading slash (e.g., <code>Service/Method</code> instead of <code>/Service/Method</code>). While…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>traefik</category><category>grpc</category><category>authorization-bypass</category><category>cve-2026-33186</category></item><item><title>Traefik ForwardAuth Authentication Bypass via X-Forwarded-Prefix Spoofing</title><link>https://feed.craftedsignal.io/briefs/2024-07-traefik-auth-bypass/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-traefik-auth-bypass/</guid><description>A high-severity authentication bypass vulnerability exists in Traefik's `ForwardAuth` middleware when `trustForwardHeader=false` is configured and Traefik is deployed behind a trusted upstream proxy; Traefik fails to sanitize the `X-Forwarded-Prefix` header, allowing attackers to spoof a trusted prefix value and gain unauthorized access to protected backend routes.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability impacts Traefik instances utilizing the <code>ForwardAuth</code> middleware with <code>trustForwardHeader=false</code>, when deployed behind a trusted upstream proxy. This vulnerability arises from Traefik&rsquo;s failure to properly sanitize the <code>X-Forwarded-Prefix</code> header. Although Traefik correctly rebuilds other <code>X-Forwarded-*</code> headers like <code>X-Forwarded-For</code> and <code>X-Forwarded-Host</code>, it does not strip or rebuild <code>X-Forwarded-Prefix</code>. An attacker can inject a malicious <code>X-Forwarded-Prefix</code> value, which is then passed to the authentication service in the subrequest. If the authentication service relies on the <code>X-Forwarded-Prefix</code> header for authorization decisions, an attacker can bypass access controls and reach protected backend routes. This issue affects Traefik versions v2.11.x before v2.11.43, v3.6.x before v3.6.14, and v3.7.0-rc.1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends a request with a crafted <code>X-Forwarded-Prefix</code> header (e.g., <code>X-Forwarded-Prefix: /admin</code>) to a trusted upstream proxy (e.g., nginx).</li>
<li>The trusted proxy forwards the request to the Traefik instance.</li>
<li>Traefik&rsquo;s <code>StripPrefix</code> middleware processes the request, stripping a configured prefix (e.g., <code>/forbidden</code>) and appending it to the <code>X-Forwarded-Prefix</code> header using <code>Header.Add</code>.</li>
<li>The <code>ForwardAuth</code> middleware creates a subrequest to the authentication service, copying all incoming headers, including the attacker-controlled <code>X-Forwarded-Prefix</code> and the <code>StripPrefix</code>-added value.</li>
<li>The authentication service receives the subrequest with the concatenated <code>X-Forwarded-Prefix</code> values, where the attacker&rsquo;s value appears first (e.g., <code>X-Forwarded-Prefix: /admin, /forbidden</code>).</li>
<li>The authentication service incorrectly uses the attacker-supplied <code>/admin</code> prefix to make authorization decisions.</li>
<li>The authentication service authorizes the request due to the spoofed prefix.</li>
<li>Traefik forwards the request to the protected backend route, granting the attacker unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows unauthenticated attackers to bypass access controls and gain unauthorized access to protected backend routes. This can lead to data breaches, unauthorized modification of resources, and other security compromises. The impact is especially severe in environments where <code>StripPrefix</code> is used before <code>ForwardAuth</code>, and where the authentication service relies heavily on the <code>X-Forwarded-Prefix</code> header for authorization decisions. The number of affected deployments is unknown but likely significant, given Traefik&rsquo;s popularity as a reverse proxy and load balancer.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Traefik version v2.11.43, v3.6.14, or v3.7.0-rc.2 or later to patch the vulnerability.</li>
<li>As a workaround, if upgrading is not immediately feasible, configure your authentication service to validate and sanitize the <code>X-Forwarded-Prefix</code> header, ensuring it only trusts values originating from the trusted proxy.</li>
<li>Implement the following Sigma rule to detect suspicious requests with the <code>X-Forwarded-Prefix</code> header targeting the <code>/forbidden</code> path, indicating potential exploitation attempts.</li>
<li>Review and harden your Traefik configuration to ensure that the <code>trustForwardHeader</code> parameter is appropriately set based on your deployment environment and trust relationships.</li>
<li>Monitor Traefik access logs for suspicious activity, especially requests with unusual <code>X-Forwarded-Prefix</code> values, using the <code>webserver</code> log source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>traefik</category><category>authentication-bypass</category><category>webserver</category></item></channel></rss>