<Vulnerability name="CVE-2026-39858">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2026-04-30T20:26:26</PublicDate>
    <Bugzilla id="2464234" url="https://bugzilla.redhat.com/show_bug.cgi?id=2464234" xml:lang="en:us">
traefik: Traefik: Authentication bypass via unsanitized alias headers
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>8.2</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-289</CWE>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in Traefik. A remote attacker can exploit an authentication bypass vulnerability by injecting spoofed trust context through unsanitized alias headers. This is due to Traefik's forwarded-header sanitization logic not properly handling alias header names that use underscores instead of dashes. This allows an attacker to bypass authentication on protected routes without valid credentials.
    </Details>
    <Mitigation xml:lang="en:us">
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
    </Mitigation>
    <PackageState cpe="cpe:/a:redhat:openshift_devspaces:3">
        <ProductName>Red Hat OpenShift Dev Spaces</ProductName>
        <FixState>Affected</FixState>
        <PackageName>devspaces/traefik-rhel9</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2026-39858
https://nvd.nist.gov/vuln/detail/CVE-2026-39858
https://github.com/traefik/traefik/releases/tag/v2.11.43
https://github.com/traefik/traefik/releases/tag/v3.6.14
https://github.com/traefik/traefik/releases/tag/v3.7.0-rc.2
https://github.com/traefik/traefik/security/advisories/GHSA-5m6w-wvh7-57vm
    </References>
</Vulnerability>