Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-66490

Опубликовано: 09 дек. 2025
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

Traefik is an HTTP reverse proxy and load balancer. For versions prior to 2.11.32 and 2.11.31 through 3.6.2, requests using PathPrefix, Path or PathRegex matchers can bypass path normalization. When Traefik uses path-based routing, requests containing URL-encoded restricted characters (/, , Null, ;, ?, #) can bypass the middleware chain and reach unintended backends. For example, a request to http://mydomain.example.com/admin%2F could reach service-a without triggering my-security-middleware, bypassing security controls for the /admin/ path. This issue is fixed in versions 2.11.32 and 3.6.3.

A path normalization bypass has been discovered in Traefik. When Traefik is configured to route the requests to a backend using a matcher based on the path; if the request path contains an encoded restricted character from the following set ('/', '', 'Null', ';', '?', '#'), it’s possible to target a backend, exposed using another router, by-passing the middlewares chain.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-436
https://bugzilla.redhat.com/show_bug.cgi?id=2420301github.com/traefik/traefik: Traefik Path Normalization Bypass in Router + Middleware Rules

EPSS

Процентиль: 4%
0.00018
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
4 месяца назад

Traefik is an HTTP reverse proxy and load balancer. For versions prior to 2.11.32 and 2.11.31 through 3.6.2, requests using PathPrefix, Path or PathRegex matchers can bypass path normalization. When Traefik uses path-based routing, requests containing URL-encoded restricted characters (/, \, Null, ;, ?, #) can bypass the middleware chain and reach unintended backends. For example, a request to http://mydomain.example.com/admin%2F could reach service-a without triggering my-security-middleware, bypassing security controls for the /admin/ path. This issue is fixed in versions 2.11.32 and 3.6.3.

CVSS3: 6.5
debian
4 месяца назад

Traefik is an HTTP reverse proxy and load balancer. For versions prior ...

github
4 месяца назад

Path Normalization Bypass in Traefik Router + Middleware Rules

EPSS

Процентиль: 4%
0.00018
Низкий

7.4 High

CVSS3