First published: Wed Feb 26 2025(Updated: )
### Summary We have encountered a security vulnerability being reported by our scanners for Traefik 2.11.22. - https://security.snyk.io/vuln/SNYK-CHAINGUARDLATEST-TRAEFIK33-9403297 ### Details It seems to target oauth2/jws library. ### PoC No steps to replicate this vulnerability ### Impact We have a strict control on security and we always try to stay up-to-date with the fixes received for third-party solutions. ## Patches - https://github.com/traefik/traefik/releases/tag/v2.11.24 - https://github.com/traefik/traefik/releases/tag/v3.3.6 - https://github.com/traefik/traefik/releases/tag/v3.4.0-rc2
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/traefik/traefik/v3 | =3.4.0-rc1 | 3.4.0-rc2 |
go/github.com/traefik/traefik/v2 | <2.11.24 | 2.11.24 |
go/github.com/traefik/traefik/v3 | <3.3.6 | 3.3.6 |
Go Jws Go | <0.27.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22868 has been classified as a medium severity vulnerability due to its potential impact on memory consumption during token parsing.
To fix CVE-2025-22868, it is recommended to update to the latest version of Google OAuth2 that addresses this vulnerability.
CVE-2025-22868 can be exploited through the use of malicious malformed tokens that can lead to unexpected memory consumption.
CVE-2025-22868 specifically affects Google OAuth2 implementations.
The potential consequences of CVE-2025-22868 include application crashes or denial of service due to excessive memory usage.