Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through 3.6.11, and 3.7.0-ea.1 comtain BasicAuth middleware that allows username enumeration via a timing attack. When a submitted username exists, the middleware performs a bcrypt password comparison taking ~166ms. When the username does not exist, the response returns immediately in ~0.6ms. This ~298x timing difference is observable over the network and allows an unauthenticated attacker to reliably distinguish valid from invalid usernames. This issue is patched in versions 2.11.41, 3.6.11 and 3.7.0-ea.2.
References
| Link | Resource |
|---|---|
| https://github.com/traefik/traefik/releases/tag/v2.11.41 | Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.6.11 | Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.7.0-ea.2 | Release Notes |
| https://github.com/traefik/traefik/security/advisories/GHSA-g3hg-j4jv-cwfr | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-20 11:18
Updated : 2026-03-24 15:14
NVD link : CVE-2026-32595
Mitre link : CVE-2026-32595
CVE.ORG link : CVE-2026-32595
JSON object : View
Products Affected
traefik
- traefik
CWE
CWE-208
Observable Timing Discrepancy
