In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the "X-Forwarded-Prefix" header. The Traefik API dashboard component doesn't validate that the value of the header "X-Forwarded-Prefix" is a site relative path and will redirect to any header provided URI. Successful exploitation of an open redirect can be used to entice victims to disclose sensitive information. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6qq8-5wq3-86rp Traefik vulnerable to Open Redirect via handling of X-Forwarded-Prefix header
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.82913}

epss

{'score': 0.84386}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T13:08:22.414Z

Reserved: 2020-06-25T00:00:00

Link: CVE-2020-15129

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-30T16:15:11.537

Modified: 2024-11-21T05:04:54.340

Link: CVE-2020-15129

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.