Changeflow GovPing Data Privacy & Cybersecurity Multiple Vulnerabilities in Traefik Software
Priority review Notice Added Final

Multiple Vulnerabilities in Traefik Software

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published March 20th, 2026
Detected March 20th, 2026
Email

Summary

CERT-FR has issued an advisory regarding multiple vulnerabilities discovered in Traefik software, affecting versions prior to v2.11.41, v3.6.11, and v3.7.0-ea.2. These vulnerabilities could lead to data confidentiality breaches and security policy bypasses. Users are advised to consult the publisher's security bulletins for patch information.

What changed

CERT-FR, the French national cybersecurity agency, has issued an advisory (CERTFR-2026-AVI-0333) detailing multiple critical vulnerabilities found in Traefik software. The vulnerabilities, identified under CVE-2026-32305 and CVE-2026-32595, affect specific versions of Traefik, including those prior to v2.11.41, v3.6.11, and v3.7.0-ea.2. Exploitation of these flaws could result in unauthorized access to sensitive data and the circumvention of established security policies.

Organizations utilizing the affected versions of Traefik must immediately consult the official Traefik security bulletins (GHSA-g3hg-j4jv-cwfr and GHSA-wvvq-wgcr-9q48) to obtain and apply the necessary patches. Failure to do so could expose systems to significant data breaches and security policy violations. This advisory highlights the ongoing need for diligent software patching and vulnerability management in network infrastructure.

What to do next

  1. Consult Traefik security bulletins GHSA-g3hg-j4jv-cwfr and GHSA-wvvq-wgcr-9q48
  2. Apply available patches for affected Traefik versions

Source document (simplified)

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 20 mars 2026 N° CERTFR-2026-AVI-0333 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans Traefik

Gestion du document

| Référence | CERTFR-2026-AVI-0333 |
| Titre | Multiples vulnérabilités dans Traefik |
| Date de la première version | 20 mars 2026 |
| Date de la dernière version | 20 mars 2026 |
| Source(s) | Bulletin de sécurité Traefik GHSA-g3hg-j4jv-cwfr du 20 mars 2026
Bulletin de sécurité Traefik GHSA-wvvq-wgcr-9q48 du 20 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risques

  • Atteinte à la confidentialité des données
  • Contournement de la politique de sécurité

Systèmes affectés

  • Traefik versions antérieures à v2.11.41
  • Traefik versions v3.6.x antérieures à v3.6.11
  • Traefik versions v3.7.0-ea.x antérieures à v3.7.0-ea.2

Résumé

De multiples vulnérabilités ont été découvertes dans Traefik. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 20 mars 2026 Version initiale

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-FR
Published
March 20th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
CERTFR-2026-AVI-0333

Who this affects

Industry sector
5112 Software & Technology
Activity scope
Network Security API Gateway Management
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software Vulnerabilities Data Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.