{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T13:11:22.563","vulnerabilities":[{"cve":{"id":"CVE-2023-47633","sourceIdentifier":"security-advisories@github.com","published":"2023-12-04T21:15:34.063","lastModified":"2024-11-21T08:30:34.263","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Traefik is an open source HTTP reverse proxy and load balancer. The traefik docker container uses 100% CPU when it serves as its own backend, which is an automatically generated route resulting from the Docker integration in the default configuration. This issue has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"Traefik es un equilibrador de carga y proxy inverso HTTP de código abierto. El contenedor acoplable traefik utiliza 100% de CPU cuando sirve como su propio backend, que es una ruta generada automáticamente como resultado de la integración de Docker en la configuración predeterminada. Este problema se solucionó en las versiones 2.10.6 y 3.0.0-beta5. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*","versionEndIncluding":"2.10.5","matchCriteriaId":"AB0C6F34-0937-44ED-B248-F7B63DDA7820"},{"vulnerable":true,"criteria":"cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*","matchCriteriaId":"376EAF9B-E994-4268-9704-0A45EA30270F"},{"vulnerable":true,"criteria":"cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*","matchCriteriaId":"F3D08335-C291-4623-B80C-3B14C4D1FA32"},{"vulnerable":true,"criteria":"cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*","matchCriteriaId":"21033CEE-CEF5-4B0D-A565-4A6FC764AA6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:traefik:traefik:3.0.0:beta4:*:*:*:*:*:*","matchCriteriaId":"4B5B7BC8-0BBF-48DC-86B1-FC3D7CB8D5AD"}]}]}],"references":[{"url":"https://github.com/traefik/traefik/releases/tag/v2.10.6","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/traefik/traefik/releases/tag/v3.0.0-beta5","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/traefik/traefik/security/advisories/GHSA-6fwg-jrfw-ff7p","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/traefik/traefik/releases/tag/v2.10.6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://github.com/traefik/traefik/releases/tag/v3.0.0-beta5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://github.com/traefik/traefik/security/advisories/GHSA-6fwg-jrfw-ff7p","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}