๐Ÿ” CVE Alert

CVE-2026-32695

UNKNOWN 0.0

Traefik has Knative Ingress Rule Injection that Allows Host Restriction Bypass

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
3th

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 3.6.11 and 3.7.0-ea.2, Traefik's Knative provider builds router rules by interpolating user-controlled values into backtick-delimited rule expressions without escaping. In live cluster validation, Knative `rules[].hosts[]` was exploitable for host restriction bypass (for example `tenant.example.com`) || Host(`attacker.com`), producing a router that serves attacker-controlled hosts. Knative `headers[].exact` also allows rule-syntax injection and proves unsafe rule construction. In multi-tenant clusters, this can route unauthorized traffic to victim services and lead to cross-tenant traffic exposure. Versions 3.6.11 and 3.7.0-ea.2 patch the issue.

CWE CWE-74
Vendor traefik
Product traefik
Published Mar 27, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for traefik traefik

Be the first to know when new unknown vulnerabilities affecting traefik traefik are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

traefik / traefik
< 3.6.11 >= 3.7.0-ea.1, < 3.7.0-ea.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/traefik/traefik/security/advisories/GHSA-67jx-r9pv-98rj github.com: https://github.com/traefik/traefik/releases/tag/v3.6.11 github.com: https://github.com/traefik/traefik/releases/tag/v3.7.0-ea.2