Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.
References
| Link | Resource |
|---|---|
| https://github.com/traefik/traefik/releases/tag/v2.11.6 | Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.0.4 | Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3 | Release Notes |
| https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9 | Patch Vendor Advisory |
| https://github.com/traefik/traefik/releases/tag/v2.11.6 | Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.0.4 | Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3 | Release Notes |
| https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Nov 2025, 14:08
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Traefik
Traefik traefik |
|
| CPE | cpe:2.3:a:traefik:traefik:3.1.0:rc2:*:*:*:*:*:* cpe:2.3:a:traefik:traefik:3.1.0:-:*:*:*:*:*:* cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:* cpe:2.3:a:traefik:traefik:3.1.0:rc1:*:*:*:*:*:* |
|
| References | () https://github.com/traefik/traefik/releases/tag/v2.11.6 - Release Notes | |
| References | () https://github.com/traefik/traefik/releases/tag/v3.0.4 - Release Notes | |
| References | () https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3 - Release Notes | |
| References | () https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9 - Patch, Vendor Advisory |
Information
Published : 2024-07-05 18:15
Updated : 2025-11-25 14:08
NVD link : CVE-2024-39321
Mitre link : CVE-2024-39321
CVE.ORG link : CVE-2024-39321
JSON object : View
Products Affected
traefik
- traefik
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
