Bug 2452289 (CVE-2026-33433) - CVE-2026-33433 github.com/traefik/traefik: Traefik: Authentication bypass via non-canonical HTTP header injection
Summary: CVE-2026-33433 github.com/traefik/traefik: Traefik: Authentication bypass via...
Keywords:
Status: NEW
Alias: CVE-2026-33433
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-27 15:03 UTC by OSIDB Bzimport
Modified: 2026-03-27 22:30 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-27 15:03:42 UTC
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.42, 3.6.11, and 3.7.0-ea.3, when `headerField` is configured with a non-canonical HTTP header name (e.g., `x-auth-user` instead of `X-Auth-User`), an authenticated attacker can inject their own canonical version of that header to impersonate any identity to the backend. The backend receives two header entries — the attacker-injected canonical one is read first, overriding Traefik's non-canonical write. Versions 2.11.42, 3.6.11, and 3.7.0-ea.3 patch the issue.


Note You need to log in before you can comment on or make changes to this bug.