Bug 2464238 (CVE-2026-41263) - CVE-2026-41263 github.com/traefik/traefik: Traefik: Username enumeration via timing side-channel in BasicAuth middleware
Summary: CVE-2026-41263 github.com/traefik/traefik: Traefik: Username enumeration via ...
Keywords:
Status: NEW
Alias: CVE-2026-41263
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-30 21:02 UTC by OSIDB Bzimport
Modified: 2026-05-04 10:12 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-30 21:02:02 UTC
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a timing side-channel vulnerability in Traefik's BasicAuth middleware that allows an attacker to enumerate valid usernames through response-time differences. The variable intended to hold a constant-time fallback secret always resolves to an empty string, causing the constant-time comparison to short-circuit in microseconds rather than performing a full bcrypt evaluation. This restores the original timing oracle and makes it possible to distinguish existing users from non-existing ones by measuring authentication response times. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.


Note You need to log in before you can comment on or make changes to this bug.