Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-41181
Published:May 15, 2026
Updated:May 18, 2026
Traefik is an HTTP reverse proxy and load balancer. Prior to 2.11.44, 3.6.15, and 3.7.0-rc.3, there is an information disclosure vulnerability in Traefik's errors (custom error pages) middleware. When the backend returns a response matching the configured status range, the middleware forwards the original request's complete header set, including Authorization, Cookie, and other authentication material, to the separate error page service rather than only the minimal context needed to render the error page. This behavior is undocumented: the documentation states only that Host is forwarded by default, so operators are not warned that sensitive credentials are shared across service boundaries. Deployments using the errors middleware with a distinct error page service may inadvertently expose end-user credentials to infrastructure that was not intended to receive them. This vulnerability is fixed in 2.11.44, 3.6.15, and 3.7.0-rc.3.
Affected Packages
github.com/traefik/traefik/v2 (GO):
Affected version(s) >=v2.0.0-rc1 <v2.11.44
Fix Suggestion:
Update to version v2.11.44
github.com/traefik/traefik/v3 (GO):
Affected version(s) >=v3.0.0 <v3.6.15
Fix Suggestion:
Update to version v3.6.15
github.com/traefik/traefik/v2 (GO):
Affected version(s) >=v2.0.0-rc1 <v2.11.44
Fix Suggestion:
Update to version v2.11.44
github.com/traefik/traefik/v3 (GO):
Affected version(s) >=v3.0.0-beta2.0.20230203142405-044dc6a221a1 <v3.6.15
Fix Suggestion:
Update to version v3.6.15
github.com/traefik/traefik/v3 (GO):
Affected version(s) =v3.7.0-rc.2 <v3.7.0-rc.3
Fix Suggestion:
Update to version v3.7.0-rc.3
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
LOW
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Insertion of Sensitive Information Into Sent Data
EPSS
Base Score:
0.03