Vulnerability DatabaseGHSA-5423-jcjm-2gpv

GHSA-5423-jcjm-2gpv
vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-5423-jcjm-2gpv) is a critical HTTP Request Smuggling vulnerability affecting Traefik, discovered and disclosed on April 18, 2025. The issue affects Traefik versions prior to v2.11.24, versions v3.3.x before v3.3.6, and versions v3.4.x before v3.4.0-rc2. This vulnerability stems from the net/http package's improper handling of chunked transfer encoding data containing invalid chunk-size lines terminated by a bare LF (GitHub Advisory).

Technical details

The vulnerability occurs when the net/http package incorrectly accepts data in chunked transfer encoding containing an invalid chunk-size line terminated by a bare LF. When used in conjunction with a server or proxy that incorrectly interprets a bare LF in a chunk extension as part of the extension, this could enable request smuggling attacks. The vulnerability has been assigned a Critical severity rating with a CVSS score of 9.1, with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N (GitHub Advisory).

Impact

The vulnerability poses significant security risks with high potential impact on both confidentiality and integrity of affected systems, while not affecting system availability. The critical CVSS score of 9.1 indicates that successful exploitation could lead to unauthorized access and potential data manipulation in affected Traefik installations (GitHub Advisory).

Mitigation and workarounds

Users are advised to upgrade to the patched versions: Traefik v2.11.24, v3.3.6, or v3.4.0-rc2. These releases include fixes for the HTTP Request Smuggling vulnerability. Since these versions, the incoming request path is cleaned before being used to match router rules and sent to backends, with any /../, /./, or duplicate slash segments being interpreted and collapsed (Traefik Release, Traefik Release, Traefik Release).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management