← Back to CVEs
CVE-2026-29777
MEDIUM6.5
Description
Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled backends. This vulnerability is fixed in 3.6.10.
CVE Details
CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published3/11/2026
Last Modified3/19/2026
Sourcenvd
Honeypot Sightings0
Affected Products
traefik:traefik
Weaknesses (CWE)
CWE-74
References
https://github.com/traefik/traefik/releases/tag/v3.6.10(security-advisories@github.com)
https://github.com/traefik/traefik/security/advisories/GHSA-8q2w-wr49-whqj(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.