Description
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a potential vulnerability in Traefik's Kubernetes CRD provider cross-namespace isolation enforcement. When providers.kubernetesCRD.allowCrossNamespace=false, Traefik correctly rejects direct cross-namespace middleware references from IngressRoute objects, but fails to apply the same restriction to middleware references nested inside a Chain middleware's spec.chain.middlewares[]. An actor with permission to create or update Traefik CRDs in their own namespace can exploit this to cause Traefik to resolve and apply middleware objects from another namespace, bypassing the documented isolation boundary. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.
Published: 2026-04-30
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Traefik's Kubernetes CRD provider enforcement of cross‑namespace isolation fails to protect nested Chain middlewares. When the allowCrossNamespace flag is set to false, the system still resolves middleware objects referenced within a Chain's spec.chain.middlewares[] from any namespace. An attacker with permission to create or update CRDs in their own namespace can thus cause Traefik to apply middleware defined in a different namespace, thereby bypassing the intended isolation boundary. This flaw enables an actor to inject unintended routing behavior, potentially exposing services, rerouting traffic, or executing other malicious middleware logic across namespaces.

Affected Systems

All Traefik releases prior to 2.11.43, 3.6.14, and 3.7.0‑rc.2 are affected. This includes the v2.11.x and v3.6.x series, as well as early v3.7.0‑rc releases. The issue is specific to the Kubernetes CRD provider and impacts any cluster configuration that uses the providers.kubernetesCRD.allowCrossNamespace setting set to false.

Risk and Exploitability

The CVSS score is 4.8, indicating a moderate severity. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to have CRD creation or update rights within their own namespace, which is a privileged action within a Kubernetes cluster. Once those rights are present, the attacker can bind chain middlewares to references in other namespaces, bypassing the namespace isolation. This raises concerns for environments that grant broad CRD permissions, especially in multi‑tenant cluster setups.

Generated by OpenCVE AI on May 2, 2026 at 00:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Traefik to version 2.11.43 or later, or 3.6.14 or 3.7.0‑rc.2 or newer.
  • Ensure that the providers.kubernetesCRD.allowCrossNamespace option remains set to false after upgrading.
  • Restrict RBAC permissions so that only trusted users or namespaces can create or modify Traefik CRDs.

Generated by OpenCVE AI on May 2, 2026 at 00:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:ea1:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:ea2:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:ea3:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.7.0:rc1:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Thu, 30 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Traefik
Traefik traefik
Vendors & Products Traefik
Traefik traefik

Thu, 30 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a potential vulnerability in Traefik's Kubernetes CRD provider cross-namespace isolation enforcement. When providers.kubernetesCRD.allowCrossNamespace=false, Traefik correctly rejects direct cross-namespace middleware references from IngressRoute objects, but fails to apply the same restriction to middleware references nested inside a Chain middleware's spec.chain.middlewares[]. An actor with permission to create or update Traefik CRDs in their own namespace can exploit this to cause Traefik to resolve and apply middleware objects from another namespace, bypassing the documented isolation boundary. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.
Title Traefik Kubernetes CRD allows unauthorized cross-namespace middleware binding
Weaknesses CWE-653
CWE-863
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-30T20:20:29.679Z

Reserved: 2026-04-17T16:34:45.526Z

Link: CVE-2026-41174

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-30T21:16:33.240

Modified: 2026-05-01T17:39:35.703

Link: CVE-2026-41174

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T00:30:16Z

Weaknesses