Vulnerability Description
Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a URL encoded string in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain. This issue has been patched in versions 2.11.25 and 3.4.1.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Traefik | Traefik | < 2.11.25 |
Related Weaknesses (CWE)
References
- https://github.com/traefik/traefik/commit/08d5dfee0164aa54dd44a467870042e18e8d3fPatch
- https://github.com/traefik/traefik/releases/tag/v2.11.25Release Notes
- https://github.com/traefik/traefik/releases/tag/v3.4.1Release Notes
- https://github.com/traefik/traefik/security/advisories/GHSA-vrch-868g-9jx5PatchVendor Advisory
FAQ
What is CVE-2025-47952?
CVE-2025-47952 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Pa...
How severe is CVE-2025-47952?
CVE-2025-47952 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-47952?
Check the references section above for vendor advisories and patch information. Affected products include: Traefik Traefik.