CVE-2024-52003

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-52003
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-52003.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-52003
Aliases
Downstream
Related
Published
2024-11-29T18:15:34.123Z
Modified
2025-11-28T02:35:33.080880Z
Severity
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
X-Forwarded-Prefix Header still allows for Open Redirect in traefik
Details

Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. There is a vulnerability in Traefik that allows the client to provide the X-Forwarded-Prefix header from an untrusted source. This issue has been addressed in versions 2.11.14 and 3.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/52xxx/CVE-2024-52003.json",
    "cwe_ids": [
        "CWE-601"
    ]
}
References

Affected packages

Git / github.com/traefik/traefik

Affected ranges

Type
GIT
Repo
https://github.com/traefik/traefik
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "2.11.14"
        }
    ]
}
Type
GIT
Repo
https://github.com/traefik/traefik
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.0.0"
        },
        {
            "fixed": "3.2.1"
        }
    ]
}