CVE-2025-54386

9.8 CRITICAL

📋 TL;DR

A path traversal vulnerability in Traefik's WASM plugin installation mechanism allows attackers to overwrite arbitrary system files by uploading malicious ZIP archives containing directory traversal sequences (../). This can lead to remote code execution, privilege escalation, or denial of service. Affected users include anyone running vulnerable Traefik versions with plugin installation enabled.

💻 Affected Systems

Products:
  • Traefik
Versions: 2.11.27 and below, 3.0.0 through 3.4.4, and 3.5.0-rc1
Operating Systems: All platforms running Traefik
Default Config Vulnerable: ⚠️ Yes
Notes: Requires plugin installation functionality to be enabled/accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

File system corruption, denial of service, or limited code execution depending on attacker's access and privileges.

🟢

If Mitigated

Limited impact if plugin installation is disabled or proper file permissions restrict write access to critical directories.

🌐 Internet-Facing: HIGH - Internet-facing Traefik instances with plugin installation enabled are directly exploitable.
🏢 Internal Only: MEDIUM - Internal instances still vulnerable but require internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires uploading a malicious ZIP file to the plugin installation endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.11.28, 3.4.5, and 3.5.0

Vendor Advisory: https://github.com/traefik/traefik/releases/tag/v2.11.28

Restart Required: Yes

Instructions:

1. Identify current Traefik version. 2. Upgrade to patched version (2.11.28, 3.4.5, or 3.5.0). 3. Restart Traefik service. 4. Verify version update.

🔧 Temporary Workarounds

Disable plugin installation

all

Disable WASM plugin installation functionality if not required.

Modify Traefik configuration to remove or disable plugin installation endpoints

Restrict plugin upload access

all

Implement network-level restrictions to limit access to plugin installation endpoints.

Configure firewall rules to restrict access to Traefik plugin endpoints

🧯 If You Can't Patch

  • Disable plugin installation functionality entirely
  • Implement strict network segmentation and access controls for Traefik instances

🔍 How to Verify

Check if Vulnerable:

Check Traefik version against affected ranges and verify plugin installation is enabled.

Check Version:

traefik version

Verify Fix Applied:

Confirm Traefik version is 2.11.28, 3.4.5, or 3.5.0+ and test plugin installation with traversal payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin installation attempts
  • File write operations outside plugin directory
  • ZIP file uploads with ../ sequences

Network Indicators:

  • HTTP requests to plugin installation endpoints with ZIP payloads

SIEM Query:

source="traefik" AND ("plugin" OR "upload" OR "zip") AND ("..\/" OR "../")

🔗 References

📤 Share & Export