Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.

Subscriptions

Vendors Products
Traefik Subscribe
Traefik Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2353 Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.
Github GHSA Github GHSA GHSA-gxrv-wf35-62w9 Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 25 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:-:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:rc2:*:*:*:*:*:*

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T04:19:20.719Z

Reserved: 2024-06-21T18:15:22.263Z

Link: CVE-2024-39321

cve-icon Vulnrichment

Updated: 2024-07-05T20:07:09.952Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-05T18:15:32.430

Modified: 2025-11-25T14:08:47.903

Link: CVE-2024-39321

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-04T00:00:00Z

Links: CVE-2024-39321 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T23:06:16Z

Weaknesses