{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-66490","title":"Title"},{"category":"description","text":"Traefik is an HTTP reverse proxy and load balancer. For versions prior to 2.11.32 and 2.11.31 through 3.6.2, requests using PathPrefix, Path or PathRegex matchers can bypass path normalization. When Traefik uses path-based routing, requests containing URL-encoded restricted characters (/, \\, Null, ;, ?, #) can bypass the middleware chain and reach unintended backends. For example, a request to http://mydomain.example.com/admin%2F could reach service-a without triggering my-security-middleware, bypassing security controls for the /admin/ path. This issue is fixed in versions 2.11.32 and 3.6.3.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-66490","url":"https://www.suse.com/security/cve/CVE-2025-66490"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1254879 for CVE-2025-66490","url":"https://bugzilla.suse.com/1254879"}],"title":"SUSE CVE CVE-2025-66490","tracking":{"current_release_date":"2026-02-05T00:33:46Z","generator":{"date":"2025-12-12T00:24:45Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-66490","initial_release_date":"2025-12-12T00:24:45Z","revision_history":[{"date":"2025-12-12T00:24:45Z","number":"2","summary":"references added,severity changed from  to important"},{"date":"2026-01-10T00:24:23Z","number":"3","summary":"vulnerabilities added"},{"date":"2026-02-05T00:33:46Z","number":"4","summary":"more updates released"}],"status":"interim","version":"4"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"traefik-3.6.6-1.1","product":{"name":"traefik-3.6.6-1.1","product_id":"traefik-3.6.6-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/traefik@3.6.6-1.1"}}},{"category":"product_version","name":"traefik2-2.11.35-1.1","product":{"name":"traefik2-2.11.35-1.1","product_id":"traefik2-2.11.35-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/traefik2@2.11.35-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"traefik-3.6.6-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:traefik-3.6.6-1.1"},"product_reference":"traefik-3.6.6-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"traefik2-2.11.35-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:traefik2-2.11.35-1.1"},"product_reference":"traefik2-2.11.35-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2025-66490","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-66490"}],"notes":[{"category":"general","text":"Traefik is an HTTP reverse proxy and load balancer. For versions prior to 2.11.32 and 2.11.31 through 3.6.2, requests using PathPrefix, Path or PathRegex matchers can bypass path normalization. When Traefik uses path-based routing, requests containing URL-encoded restricted characters (/, \\, Null, ;, ?, #) can bypass the middleware chain and reach unintended backends. For example, a request to http://mydomain.example.com/admin%2F could reach service-a without triggering my-security-middleware, bypassing security controls for the /admin/ path. This issue is fixed in versions 2.11.32 and 3.6.3.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:traefik-3.6.6-1.1","openSUSE Tumbleweed:traefik2-2.11.35-1.1"]},"references":[{"category":"external","summary":"CVE-2025-66490","url":"https://www.suse.com/security/cve/CVE-2025-66490"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1254879 for CVE-2025-66490","url":"https://bugzilla.suse.com/1254879"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:traefik-3.6.6-1.1","openSUSE Tumbleweed:traefik2-2.11.35-1.1"]}],"scores":[{"cvss_v3":{"baseScore":7.4,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:traefik-3.6.6-1.1","openSUSE Tumbleweed:traefik2-2.11.35-1.1"]}],"threats":[{"category":"impact","date":"2025-12-09T03:03:39Z","details":"important"}],"title":"CVE-2025-66490"}]}