FIND-20260402-009 · 2026-04-02 · Innovation Veille
CVE-2026-32695: Traefik Knative Ingress Rule Injection — host restriction bypass (MEDIUM, patched 3.6.11)
cve
MEDIUM
MEDIUM (CVSS 6.3) vulnerability in Traefik's Kubernetes Knative provider. User-controlled values in Knative rules[].hosts[] are interpolated into backtick-delimited Traefik router rule expressions without escaping. A user with cluster privileges can inject backtick-terminated values to bypass host routing constraints (e.g. tenant.example.com) || Host(attacker.com)), enabling cross-tenant traffic redirection. Requires existing cluster privileges. Fixed in Traefik 3.6.11. ODS runs 3.6.12 — patch is in place. ODS does not use Knative (uses standard Kubernetes ingress), further reducing exposure.
Source
https://advisories.gitlab.com/pkg/golang/github.com/traefik/traefik/v3/CVE-2026-32695/
ODS Impact
ODS uses Traefik as API Gateway without Knative. This vulnerability requires Knative provider enabled, which is not part of ODS infrastructure. Exposure is minimal. Patched in current 3.6.12 deployment. No action required.
Security Review
License: N/A (CVE) | Maintenance: ACTIVE | Risk: LOW | Recommendation: SAFE_TO_USE
Tags
cve
traefik
medium
knative
host-bypass
patched
multi-tenant