CVE-2025-32431: Traefik has a possible vulnerability with the path matchers
(updated )
There is a potential vulnerability in Traefik managing the requests using a PathPrefix
, Path
or PathRegex
matcher.
When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a /../
in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain.
References
- github.com/advisories/GHSA-6p68-w45g-48j7
- github.com/traefik/traefik
- github.com/traefik/traefik/pull/11684
- github.com/traefik/traefik/releases/tag/v2.11.24
- github.com/traefik/traefik/releases/tag/v3.3.6
- github.com/traefik/traefik/releases/tag/v3.4.0-rc2
- github.com/traefik/traefik/security/advisories/GHSA-6p68-w45g-48j7
- nvd.nist.gov/vuln/detail/CVE-2025-32431
Code Behaviors & Features
Detect and mitigate CVE-2025-32431 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →