Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

884+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-35051: Traefik ForwardAuth Authentication Bypass via Proxy Trust Abuse (CVSS 10.0)
CVE-2026-35051: Traefik ForwardAuth Authentication Bypass via Proxy Trust Abuse (CVSS 10.0)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-35051

CVE-2026-35051: Traefik ForwardAuth Authentication Bypass via Proxy Trust Abuse (CVSS 10.0)

A critical CVSS 10.0 authentication bypass in Traefik's ForwardAuth middleware allows attackers to circumvent authentication when the proxy is deployed behind a trusted upstream. Versions prior to 2.11.43, 3.6.14, and 3.7.0-rc.2 are affected.

Dylan H.

Security Team

May 1, 2026
5 min read

Affected Products

  • Traefik < 2.11.43
  • Traefik < 3.6.14
  • Traefik < 3.7.0-rc.2

Executive Summary

A critical authentication bypass vulnerability (CVE-2026-35051, CVSS 10.0) has been disclosed in Traefik, the widely deployed HTTP reverse proxy and load balancer. The flaw resides in Traefik's ForwardAuth middleware and is triggered when trustForwardHeader=false is configured and Traefik is deployed behind a trusted upstream proxy.

Under this configuration, attackers who can inject or manipulate HTTP headers reaching Traefik can bypass the ForwardAuth authentication check entirely, gaining unauthorized access to backend services protected by Traefik's authentication layer.

Organizations running Traefik in configurations with an upstream trusted proxy should update to version 2.11.43, 3.6.14, or 3.7.0-rc.2 immediately.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-35051
CVSS Score10.0 (Critical)
CWECWE-287 — Improper Authentication
TypeAuthentication Bypass
Attack VectorNetwork
Privileges RequiredNone
User InteractionNone
Affected ComponentForwardAuth Middleware
Fixed Versions2.11.43, 3.6.14, 3.7.0-rc.2

Affected Versions

BranchAffectedFixed Version
Traefik v2.x< 2.11.432.11.43
Traefik v3.x< 3.6.143.6.14
Traefik v3.7 (RC)< 3.7.0-rc.23.7.0-rc.2

Technical Analysis

How ForwardAuth Works

Traefik's ForwardAuth middleware delegates authentication decisions to an external service. When a request arrives at Traefik, it forwards the request (or a copy of its headers) to an authentication service. If the auth service returns a 2xx response, the request proceeds; otherwise, Traefik rejects it.

The trustForwardHeader configuration option controls whether Traefik trusts X-Forwarded-* headers from upstream proxies. When set to false, Traefik should reject or strip these headers, refusing to honor potentially attacker-controlled forwarded-address claims.

The Vulnerability

The vulnerability arises when trustForwardHeader=false is set but Traefik is deployed behind a trusted upstream proxy (such as a CDN, load balancer, or another reverse proxy). In this scenario:

  1. The upstream proxy is trusted and adds legitimate X-Forwarded-* headers
  2. Traefik, configured with trustForwardHeader=false, should strip these headers before forwarding to the ForwardAuth service
  3. Due to the vulnerability, under specific conditions the header stripping logic does not apply correctly, allowing crafted headers from the upstream or an attacker to influence the ForwardAuth decision
  4. The authentication check can be bypassed, forwarding requests to the backend without proper authentication validation

Attack Flow

1. Attacker sends an HTTP request to the upstream proxy in front of Traefik
2. Attacker crafts or injects headers that influence the ForwardAuth flow
3. Despite trustForwardHeader=false, Traefik's header sanitization fails to strip
   or properly handle the crafted headers in the trusted-proxy configuration
4. The ForwardAuth service receives manipulated request context
5. ForwardAuth incorrectly approves the request (or is bypassed entirely)
6. Traefik forwards the attacker's request to the protected backend service
7. Attacker gains unauthorized access to services behind Traefik's auth layer

Conditions for Exploitation

  • Traefik with ForwardAuth middleware enabled
  • trustForwardHeader=false configured (intended to increase security, paradoxically the vulnerable state)
  • Traefik deployed behind an upstream proxy/load balancer
  • Attacker can send HTTP requests that reach the upstream proxy

Impact Assessment

Impact AreaDescription
Authentication BypassComplete bypass of ForwardAuth-protected routes
Unauthorized API AccessAccess to APIs and services protected by Traefik auth
Data ExfiltrationUnauthorized access to protected data behind Traefik
Privilege EscalationBypass of authentication enables access to admin interfaces
Lateral MovementAccess to internal services using Traefik as an entry point
Compliance ViolationAuthentication bypass violates numerous compliance frameworks

Remediation

Step 1: Update Traefik Immediately

# Docker — pull the patched image
docker pull traefik:v3.6.14
# or
docker pull traefik:v2.11.43
 
# Kubernetes Helm
helm upgrade traefik traefik/traefik --version <patched-chart-version>
 
# Verify version
traefik version

Step 2: Restart Traefik with the Updated Image

# Docker Compose
docker-compose pull traefik
docker-compose up -d traefik
 
# Kubernetes
kubectl rollout restart deployment/traefik -n traefik
kubectl rollout status deployment/traefik -n traefik

Step 3: Review ForwardAuth Configuration

Audit all ForwardAuth middleware configurations for the interaction between trustForwardHeader and upstream proxy settings:

# traefik.yml — review these settings
providers:
  file:
    filename: /etc/traefik/dynamic.yml
 
entryPoints:
  web:
    address: ":80"
  websecure:
    address: ":443"
 
# Check forwarded header trust settings
# After patching, verify trustForwardHeader behavior is as expected

Step 4: Verify ForwardAuth Middleware in Dynamic Config

# dynamic.yml — audit ForwardAuth middleware
http:
  middlewares:
    auth-middleware:
      forwardAuth:
        address: "https://auth.example.com/verify"
        trustForwardHeader: false
        # After patch, verify header sanitization works correctly
        authResponseHeaders:
          - "X-Auth-User"
          - "X-Auth-Groups"

Step 5: Temporary Workaround (If Immediate Update Is Not Possible)

If an emergency patch is not immediately deployable, consider:

  1. Temporarily disable ForwardAuth on non-critical routes until patching is complete
  2. Add authentication at the upstream proxy level as an additional layer
  3. Restrict access to ForwardAuth-protected routes at the network/firewall level

Detection

IndicatorDescription
Requests reaching backends without valid auth tokensForwardAuth bypassed
Unusual X-Forwarded-* headers in Traefik access logsHeader injection attempts
Access to protected routes from unexpected IPsBypass exploitation
ForwardAuth service receiving unusual request patternsActive exploitation probe

Enable Traefik access logging to detect anomalies:

# traefik.yml
log:
  level: INFO
  
accessLog:
  filePath: "/var/log/traefik/access.log"
  format: json
  fields:
    headers:
      defaultMode: keep

Post-Remediation Checklist

  1. Update Traefik to version 2.11.43, 3.6.14, or 3.7.0-rc.2
  2. Restart Traefik and verify the new version is running
  3. Audit ForwardAuth middleware configurations across all deployments
  4. Test authentication flows to confirm ForwardAuth is functioning correctly
  5. Review access logs for signs of prior exploitation attempts
  6. Rotate credentials/tokens for any services protected by ForwardAuth
  7. Monitor for anomalous authentication patterns post-patch

References

  • NVD — CVE-2026-35051
  • Traefik GitHub — Security Advisories
  • CWE-287 — Improper Authentication
#CVE-2026-35051#Traefik#Authentication Bypass#Reverse Proxy#ForwardAuth#CVSS 10#CWE-287

Related Articles

CVE-2026-39858: Traefik Forwarded-Header Sanitization Bypass in ForwardAuth and Snippet Middleware (CVSS 10.0)

A second critical CVSS 10.0 authentication bypass in Traefik allows attackers to defeat ForwardAuth and snippet-based authentication middleware by exploiting a flaw in forwarded-header sanitization logic. All versions prior to 2.11.43, 3.6.14, and 3.7.0-rc.2 are affected.

6 min read

Juju Dqlite Cluster TLS Auth Bypass — Unauthenticated Database Access (CVE-2026-4370)

A CVSS 10.0 critical vulnerability in Juju versions 3.2.0–3.6.18 and 4.0–4.0.3 allows unauthenticated attackers to connect directly to the internal Dqlite...

6 min read

CVE-2026-41940: WebPros cPanel & WHM and WP2 Missing Authentication Vulnerability

WebPros cPanel, WHM, and WP2 (WordPress Squared) contain a critical authentication bypass in the login flow, allowing unauthenticated remote attackers to gain unauthorized access to the hosting control panel. Added to CISA KEV as actively exploited.

6 min read
Back to all Security Alerts