Description
Traefik is an HTTP reverse proxy and load balancer. Prior to 2.11.46, 3.6.17, and 3.7.1, Traefik's Kubernetes Gateway API provider allows a tenant with HTTPRoute creation permissions to expose the REST provider handler, bypassing the providers.rest.insecure=false setting. The Gateway provider accepts any TraefikService backend reference whose name ends with @internal, making it possible to route traffic to rest@internal in addition to the intended api@internal. In shared Gateway deployments where the REST provider is enabled, this allows a low-privileged actor to gain live dynamic configuration write access to Traefik, enabling unauthorized reconfiguration of routers and services. This vulnerability is fixed in 2.11.46, 3.6.17, and 3.7.1.
Published: 2026-05-15
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Traefik’s Kubernetes Gateway API provider originally allowed a tenant who could create HTTPRoutes to reference any TraefikService backend whose name ended with @internal. Because of this oversight, a user could route traffic to the rest@internal endpoint even when the providers.rest.insecure=false flag was set, effectively bypassing the intended restriction. The exposed REST handler grants live, dynamic configuration write access to the Traefik instance, allowing the malicious actor to modify routers, services, and other configuration elements. The flaw is a classical example of a privilege escalation and configuration tampering weakness, as described by CWE-284.

Affected Systems

This issue affects the Traefik reverse proxy and load balancer for all versions prior to 2.11.46, 3.6.17, and 3.7.1. Deployments that run shared Gateway APIs and enable the REST provider are at risk when a low‑privileged user is granted the ability to create HTTPRoutes.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity, and there is no EPSS score available, which suggests limited observable exploitation data at this time. The vulnerability is not currently listed in the CISA KEV catalog. An attacker would need legitimate permission to create HTTPRoute resources, which is a prerequisite that limits the attack surface to environments with overly permissive role‑based access control. Once an attacker has that permission, the exploitation path is straightforward: they create or modify an HTTPRoute to reference rest@internal and then interact with the REST API to reconfigure Traefik. No additional foothold or privilege escalation beyond the existing permissions is required.

Generated by OpenCVE AI on May 15, 2026 at 17:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Traefik to v2.11.46, v3.6.17, or v3.7.1 where the Gatewaay provider check has been corrected
  • Confirm that the providers.rest.insecure flag remains false and that the REST provider is disabled for shared gateway deployments
  • Restrict the ability to create HTTPRoute resources to trusted principals and enforce least‑privilege RBAC policies

Generated by OpenCVE AI on May 15, 2026 at 17:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-96qj-4jj5-wcjc Traefik: Gateway API TraefikService backend accepts rest@internal, allowing unauthorized exposure of the REST provider despite providers.rest.insecure=false
History

Sat, 16 May 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Traefik
Traefik traefik
Vendors & Products Traefik
Traefik traefik

Fri, 15 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description Traefik is an HTTP reverse proxy and load balancer. Prior to 2.11.46, 3.6.17, and 3.7.1, Traefik's Kubernetes Gateway API provider allows a tenant with HTTPRoute creation permissions to expose the REST provider handler, bypassing the providers.rest.insecure=false setting. The Gateway provider accepts any TraefikService backend reference whose name ends with @internal, making it possible to route traffic to rest@internal in addition to the intended api@internal. In shared Gateway deployments where the REST provider is enabled, this allows a low-privileged actor to gain live dynamic configuration write access to Traefik, enabling unauthorized reconfiguration of routers and services. This vulnerability is fixed in 2.11.46, 3.6.17, and 3.7.1.
Title Traefik: Gateway API TraefikService backend accepts rest@internal, allowing unauthorized exposure of the REST provider despite providers.rest.insecure=false
Weaknesses CWE-284
References
Metrics cvssV4_0

{'score': 6.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-16T01:12:49.947Z

Reserved: 2026-05-07T19:20:44.688Z

Link: CVE-2026-44774

cve-icon Vulnrichment

Updated: 2026-05-16T01:12:43.609Z

cve-icon NVD

Status : Received

Published: 2026-05-15T17:16:48.210

Modified: 2026-05-15T17:16:48.210

Link: CVE-2026-44774

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T17:30:04Z

Weaknesses