CVE-2026-29054

7.5 HIGH

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to bypass Traefik's protection mechanisms and remove critical X-Forwarded headers that identify client information. Attackers can manipulate the Connection header using lowercase tokens to strip identity headers like X-Real-IP and X-Forwarded-Host. This affects Traefik reverse proxy deployments running vulnerable versions 2.11.9-2.11.37 or 3.1.3-3.6.8.

💻 Affected Systems

Products:
  • Traefik
Versions: 2.11.9 to 2.11.37 and 3.1.3 to 3.6.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects HTTP/1.1 requests. Requires Traefik to be configured with X-Forwarded headers enabled (default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can completely obfuscate their identity, making requests appear to originate from the proxy itself, enabling IP spoofing, bypassing IP-based access controls, and hiding attack sources in logs.

🟠

Likely Case

Attackers can strip client identity headers, making forensic investigation difficult and potentially bypassing some IP-based security controls.

🟢

If Mitigated

With proper network segmentation and additional authentication layers, the impact is limited to loss of accurate client IP logging.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted HTTP/1.1 requests with lowercase Connection header tokens. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.11.38 or 3.6.9

Vendor Advisory: https://github.com/traefik/traefik/security/advisories/GHSA-92mv-8f8w-wq52

Restart Required: Yes

Instructions:

1. Identify your Traefik version. 2. Upgrade to 2.11.38 if using Traefik 2.x. 3. Upgrade to 3.6.9 if using Traefik 3.x. 4. Restart Traefik service. 5. Verify the fix by checking version and testing with vulnerable requests.

🔧 Temporary Workarounds

HTTP/2 Enforcement

all

Force all traffic to use HTTP/2 where possible, as this vulnerability only affects HTTP/1.1 requests.

Header Validation Middleware

all

Implement custom middleware to validate and sanitize Connection headers before they reach Traefik's vulnerable processing.

🧯 If You Can't Patch

  • Implement network-level IP filtering and rate limiting to reduce attack surface
  • Deploy a WAF or additional reverse proxy layer that properly validates Connection headers

🔍 How to Verify

Check if Vulnerable:

Check if Traefik version falls within affected ranges: 2.11.9-2.11.37 or 3.1.3-3.6.8. Test by sending HTTP/1.1 request with 'Connection: x-real-ip' header and observing if X-Real-IP header is stripped.

Check Version:

traefik version

Verify Fix Applied:

After patching, test with same vulnerable request. X-Real-IP header should persist. Check version is 2.11.38+ or 3.6.9+.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with lowercase Connection headers targeting X-Forwarded headers
  • Missing X-Real-IP or other X-Forwarded headers in logs where they should appear

Network Indicators:

  • HTTP/1.1 requests with Connection header containing lowercase X-Forwarded header names

SIEM Query:

http.request.headers.connection:"x-real-ip" OR http.request.headers.connection:"x-forwarded-*"

🔗 References

📤 Share & Export