{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Traefik versions v3.7.0-ea.x ant\u00e9rieures \u00e0 v3.7.0-ea.3","product":{"name":"Traefik","vendor":{"name":"Traefik","scada":false}}},{"description":"Traefik versions ant\u00e9rieures \u00e0 v2.11.42","product":{"name":"Traefik","vendor":{"name":"Traefik","scada":false}}},{"description":"Traefik versions v3.6.x ant\u00e9rieures \u00e0 v3.6.12","product":{"name":"Traefik","vendor":{"name":"Traefik","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2026-33186","url":"https://www.cve.org/CVERecord?id=CVE-2026-33186"},{"name":"CVE-2026-32695","url":"https://www.cve.org/CVERecord?id=CVE-2026-32695"},{"name":"CVE-2026-33433","url":"https://www.cve.org/CVERecord?id=CVE-2026-33433"}],"links":[],"reference":"CERTFR-2026-AVI-0366","revisions":[{"description":"Version initiale","revision_date":"2026-03-27T00:00:00.000000"}],"risks":[{"description":"Contournement de la politique de s\u00e9curit\u00e9"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Traefik. Elles permettent \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.","title":"Multiples vuln\u00e9rabilit\u00e9s dans Traefik","vendor_advisories":[{"published_at":"2026-03-27","title":"Bulletin de s\u00e9curit\u00e9 Traefik GHSA-qr99-7898-vr7c","url":"https://github.com/traefik/traefik/security/advisories/GHSA-qr99-7898-vr7c"},{"published_at":"2026-03-27","title":"Bulletin de s\u00e9curit\u00e9 Traefik GHSA-46wh-3698-f2cx","url":"https://github.com/traefik/traefik/security/advisories/GHSA-46wh-3698-f2cx"},{"published_at":"2026-03-27","title":"Bulletin de s\u00e9curit\u00e9 Traefik GHSA-67jx-r9pv-98rj","url":"https://github.com/traefik/traefik/security/advisories/GHSA-67jx-r9pv-98rj"}]}
