Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint respondingTimeouts.readTimeout by sending the 8-byte Postgres SSLRequest (STARTTLS) prelude and then stalling, causing connections to remain open indefinitely, leading to a denial of service. This vulnerability is fixed in 3.6.8.
References
| Link | Resource |
|---|---|
| https://github.com/traefik/traefik/commit/31e566e9f1d7888ccb6fbc18bfed427203c35678 | Patch |
| https://github.com/traefik/traefik/releases/tag/v3.6.8 | Product Release Notes |
| https://github.com/traefik/traefik/security/advisories/GHSA-89p3-4642-cr2w | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-12 20:16
Updated : 2026-02-20 18:44
NVD link : CVE-2026-25949
Mitre link : CVE-2026-25949
CVE.ORG link : CVE-2026-25949
JSON object : View
Products Affected
traefik
- traefik
CWE
CWE-400
Uncontrolled Resource Consumption
