-
Notifications
You must be signed in to change notification settings - Fork 73
Closed
Labels
Description
Advisory GHSA-q6gg-9f92-r9wg references a vulnerability in the following Go modules:
Module |
---|
github.com/traefik/traefik |
github.com/traefik/traefik/v2 |
github.com/traefik/traefik/v3 |
Description:
Summary
A path traversal vulnerability was discovered in WASM Traefik’s plugin installation mechanism. By supplying a maliciously crafted ZIP archive containing file paths with ../
sequences, an attacker can overwrite arbitrary files on the system outside of the intended plugin directory. This can lead to remote code execution (RCE), privilege escalation, persistence, or denial of service.
✅ After investigation, it is confirmed that no plugins on the Catalog were affected. There is no known impact.
Details
The vulnerability resides in t...
References:
- ADVISORY: GHSA-q6gg-9f92-r9wg
- ADVISORY: GHSA-q6gg-9f92-r9wg
- FIX: Disallow download of un-verified versions for WASM plugins traefik/plugin-service#71
- FIX: Compute digest when no asset digest traefik/plugin-service#72
- FIX: traefik/traefik@5ef853a
- FIX: Fix client arbitrary file access during archive extraction zipslip traefik/traefik#11911
- WEB: https://github.com/traefik/traefik/releases/tag/v2.11.28
Cross references:
- github.com/traefik/traefik appears in 23 other report(s):
- data/excluded/GO-2023-2117.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-7v4p-328v-8v5g #2117) DEPENDENT_VULNERABILITY
- data/reports/GO-2022-0325.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2022-23632 #325)
- data/reports/GO-2022-0808.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-7h6j-2268-fhcm #808)
- data/reports/GO-2022-0923.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2021-32813, GHSA-m697-4v8f-55qg #923)
- data/reports/GO-2022-1152.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v2: GHSA-468w-8x39-gj5v #1152)
- data/reports/GO-2022-1154.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v2: GHSA-h2ph-vhm7-g4hp #1154)
- data/reports/GO-2023-1919.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-r3fq-cmmw-cpmm #1919)
- data/reports/GO-2023-1950.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-2cjc-rgmp-x649 #1950)
- data/reports/GO-2023-2376.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2023-47106 #2376)
- data/reports/GO-2023-2377.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2023-47633 #2377)
- data/reports/GO-2023-2381.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-8g85-whqh-cr2f #2381)
- data/reports/GO-2024-2722.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-4vwx-54mw-vqfw #2722)
- data/reports/GO-2024-2726.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-7f4j-64p6-5h5v #2726)
- data/reports/GO-2024-2880.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-f7cq-5v43-8pwp #2880)
- data/reports/GO-2024-2917.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-7jmw-8259-q9jx #2917)
- data/reports/GO-2024-2941.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v2: GHSA-rvj4-q8q5-8grf #2941)
- data/reports/GO-2024-2973.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2024-39321 #2973)
- data/reports/GO-2024-3135.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-62c8-mh53-4cqv #3135)
- data/reports/GO-2024-3299.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2024-52003 #3299)
- data/reports/GO-2024-3342.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-hxr6-2p24-hf98 #3342)
- data/reports/GO-2025-3627.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-5423-jcjm-2gpv #3627)
- data/reports/GO-2025-3634.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2025-32431 #3634)
- data/reports/GO-2025-3719.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-vrch-868g-9jx5 #3719)
- github.com/traefik/traefik/v2 appears in 21 other report(s):
- data/excluded/GO-2022-1057.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v2: GHSA-c6hx-pjc3-7fqr #1057) DEPENDENT_VULNERABILITY
- data/excluded/GO-2023-1715.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v2: GHSA-7hj9-rv74-5g92 #1715) DEPENDENT_VULNERABILITY
- data/reports/GO-2022-0325.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2022-23632 #325)
- data/reports/GO-2022-0923.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2021-32813, GHSA-m697-4v8f-55qg #923)
- data/reports/GO-2022-1152.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v2: GHSA-468w-8x39-gj5v #1152)
- data/reports/GO-2022-1154.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v2: GHSA-h2ph-vhm7-g4hp #1154)
- data/reports/GO-2023-2376.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2023-47106 #2376)
- data/reports/GO-2023-2377.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2023-47633 #2377)
- data/reports/GO-2023-2381.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-8g85-whqh-cr2f #2381)
- data/reports/GO-2024-2722.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-4vwx-54mw-vqfw #2722)
- data/reports/GO-2024-2726.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-7f4j-64p6-5h5v #2726)
- data/reports/GO-2024-2880.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-f7cq-5v43-8pwp #2880)
- data/reports/GO-2024-2917.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-7jmw-8259-q9jx #2917)
- data/reports/GO-2024-2941.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v2: GHSA-rvj4-q8q5-8grf #2941)
- data/reports/GO-2024-2973.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2024-39321 #2973)
- data/reports/GO-2024-3135.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-62c8-mh53-4cqv #3135)
- data/reports/GO-2024-3299.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2024-52003 #3299)
- data/reports/GO-2024-3342.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-hxr6-2p24-hf98 #3342)
- data/reports/GO-2025-3627.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-5423-jcjm-2gpv #3627)
- data/reports/GO-2025-3634.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2025-32431 #3634)
- data/reports/GO-2025-3719.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-vrch-868g-9jx5 #3719)
- github.com/traefik/traefik/v3 appears in 15 other report(s):
- data/reports/GO-2023-2376.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2023-47106 #2376)
- data/reports/GO-2023-2377.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2023-47633 #2377)
- data/reports/GO-2023-2381.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-8g85-whqh-cr2f #2381)
- data/reports/GO-2024-2722.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-4vwx-54mw-vqfw #2722)
- data/reports/GO-2024-2726.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-7f4j-64p6-5h5v #2726)
- data/reports/GO-2024-2880.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-f7cq-5v43-8pwp #2880)
- data/reports/GO-2024-2917.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-7jmw-8259-q9jx #2917)
- data/reports/GO-2024-2941.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v2: GHSA-rvj4-q8q5-8grf #2941)
- data/reports/GO-2024-2973.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2024-39321 #2973)
- data/reports/GO-2024-3135.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-62c8-mh53-4cqv #3135)
- data/reports/GO-2024-3299.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2024-52003 #3299)
- data/reports/GO-2024-3342.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-hxr6-2p24-hf98 #3342)
- data/reports/GO-2025-3627.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-5423-jcjm-2gpv #3627)
- data/reports/GO-2025-3634.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2025-32431 #3634)
- data/reports/GO-2025-3719.yaml (x/vulndb: potential Go vuln in github.com/traefik/traefik: GHSA-vrch-868g-9jx5 #3719)
See doc/quickstart.md for instructions on how to triage this report.
id: GO-ID-PENDING
modules:
- module: github.com/traefik/traefik
non_go_versions:
- introduced: TODO (earliest fixed "2.11.28", vuln range "<= 2.11.27")
- introduced: TODO (earliest fixed "3.5.0", vuln range ">= 3.5.0-rc1, <= 3.5.0-rc2")
- introduced: TODO (earliest fixed "3.4.5", vuln range "<= 3.4.4")
vulnerable_at: 1.7.34
- module: github.com/traefik/traefik/v2
vulnerable_at: 2.11.28
- module: github.com/traefik/traefik/v3
vulnerable_at: 3.5.0
summary: |-
Traefik Client Plugin's Path Traversal Vulnerability Allows Arbitrary File
Overwrite and Remote Code Execution in github.com/traefik/traefik
cves:
- CVE-2025-54386
ghsas:
- GHSA-q6gg-9f92-r9wg
references:
- advisory: https://github.com/advisories/GHSA-q6gg-9f92-r9wg
- advisory: https://github.com/traefik/traefik/security/advisories/GHSA-q6gg-9f92-r9wg
- fix: https://github.com/traefik/plugin-service/pull/71
- fix: https://github.com/traefik/plugin-service/pull/72
- fix: https://github.com/traefik/traefik/commit/5ef853a0c53068f69a6c229a5815a0dc6e0a8800
- fix: https://github.com/traefik/traefik/pull/11911
- web: https://github.com/traefik/traefik/releases/tag/v2.11.28
notes:
- fix: 'module merge error: could not merge versions of module github.com/traefik/traefik: invalid or non-canonical semver version (found TODO (earliest fixed "3.5.0", vuln range ">= 3.5.0-rc1, <= 3.5.0-rc2"))'
source:
id: GHSA-q6gg-9f92-r9wg
created: 2025-08-01T19:01:19.085071999Z
review_status: UNREVIEWED