Vulnerability Description
Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint respondingTimeouts.readTimeout by sending the 8-byte Postgres SSLRequest (STARTTLS) prelude and then stalling, causing connections to remain open indefinitely, leading to a denial of service. This vulnerability is fixed in 3.6.8.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Traefik | Traefik | < 3.6.8 |
Related Weaknesses (CWE)
References
- https://github.com/traefik/traefik/commit/31e566e9f1d7888ccb6fbc18bfed427203c356Patch
- https://github.com/traefik/traefik/releases/tag/v3.6.8ProductRelease Notes
- https://github.com/traefik/traefik/security/advisories/GHSA-89p3-4642-cr2wPatchVendor Advisory
FAQ
What is CVE-2026-25949?
CVE-2026-25949 is a vulnerability with a CVSS score of 7.5 (HIGH). Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint re...
How severe is CVE-2026-25949?
CVE-2026-25949 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25949?
Check the references section above for vendor advisories and patch information. Affected products include: Traefik Traefik.