Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0648

NIXPKGS-2026-0648
published on
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored package traefik-certs-dumper
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Traefik has a kubernetes gateway rule injection via unescaped backticks in HTTPRoute match values

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled backends. This vulnerability is fixed in 3.6.10.

Affected products

traefik
  • ==< 3.6.10

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/traefik/traefik/security/advisories/GHSA-8q2w-wr49-whqj