CVE-2026-26998
📋 TL;DR
Traefik reverse proxy versions before 2.11.38 and 3.6.9 have a memory exhaustion vulnerability in the ForwardAuth middleware. When configured with ForwardAuth, Traefik reads authentication server responses without size limits, allowing attackers to crash the service via large responses. This affects all Traefik instances using ForwardAuth middleware.
💻 Affected Systems
- Traefik
📦 What is this software?
Traefik by Traefik
Traefik by Traefik
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service for all routes served by Traefik instance due to out-of-memory crash, requiring manual restart.
Likely Case
Service disruption when authentication server returns unexpectedly large responses, either maliciously or due to misconfiguration.
If Mitigated
Minimal impact if authentication servers are trusted and properly configured to return reasonable response sizes.
🎯 Exploit Status
Exploitation requires ability to control or influence authentication server responses. No authentication bypass or code execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.11.38 or 3.6.9
Vendor Advisory: https://github.com/traefik/traefik/security/advisories/GHSA-fw45-f5q2-2p4x
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Stop Traefik service. 3. Update to Traefik 2.11.38+ or 3.6.9+. 4. Restart Traefik service. 5. Verify service is running and functional.
🔧 Temporary Workarounds
Limit authentication server response size
allConfigure authentication servers to limit response body sizes to reasonable values (e.g., under 10MB)
Disable ForwardAuth middleware
allTemporarily disable ForwardAuth middleware if not essential for operations
# Edit Traefik configuration to remove or comment out ForwardAuth middleware sections
🧯 If You Can't Patch
- Implement network controls to restrict access to authentication servers
- Monitor authentication server response sizes and implement alerts for abnormal patterns
🔍 How to Verify
Check if Vulnerable:
Check Traefik version and ForwardAuth configuration: traefik version && grep -r 'ForwardAuth' /etc/traefik/
Check Version:
traefik version
Verify Fix Applied:
Confirm version is 2.11.38+ (v2) or 3.6.9+ (v3): traefik version
📡 Detection & Monitoring
Log Indicators:
- Traefik process crashes with out-of-memory errors
- High memory usage spikes in monitoring
- Authentication server returning unusually large responses
Network Indicators:
- Large HTTP responses from authentication servers to Traefik instances
SIEM Query:
source="traefik" AND ("out of memory" OR "OOM" OR "panic")