<Vulnerability name="CVE-2026-35051">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2026-04-30T20:26:06</PublicDate>
    <Bugzilla id="2464235" url="https://bugzilla.redhat.com/show_bug.cgi?id=2464235" xml:lang="en:us">
Traefik: github.com/traefik/traefik: Traefik: Authentication bypass in ForwardAuth middleware
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>8.2</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-501</CWE>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in Traefik, an HTTP reverse proxy and load balancer. This authentication bypass vulnerability exists in Traefik's ForwardAuth middleware when the `trustForwardHeader` setting is configured as `false` and Traefik is deployed behind a trusted upstream proxy. A remote attacker could exploit this to bypass authentication, potentially gaining unauthorized access to protected resources.
    </Details>
    <Mitigation xml:lang="en:us">
To mitigate this issue, ensure that the `trustForwardHeader` setting in Traefik's ForwardAuth middleware is not explicitly configured as `false` unless absolutely necessary. If Traefik is deployed behind a trusted upstream proxy, review the configuration to ensure that `trustForwardHeader` is either set to `true` or omitted, allowing Traefik to correctly process forwarded headers for authentication. If this configuration is modified, a restart or reload of the Traefik service may be required for the changes to take effect.
    </Mitigation>
    <PackageState cpe="cpe:/a:redhat:openshift_devspaces:3">
        <ProductName>Red Hat OpenShift Dev Spaces</ProductName>
        <FixState>Affected</FixState>
        <PackageName>devspaces/traefik-rhel9</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2026-35051
https://nvd.nist.gov/vuln/detail/CVE-2026-35051
https://github.com/traefik/traefik/releases/tag/v2.11.43
https://github.com/traefik/traefik/releases/tag/v3.6.14
https://github.com/traefik/traefik/releases/tag/v3.7.0-rc.2
https://github.com/traefik/traefik/security/advisories/GHSA-6384-m2mw-rf54
    </References>
</Vulnerability>