8.8
CVSSv3

CVE-2025-24514

CVSSv4: NA | CVSSv3: 8.8 | CVSSv2: NA | VMScore: 980 | EPSS: 0.33926 | KEV: Not Included
Published: 25/03/2025 Updated: 27/03/2025

Vulnerability Summary

Arbitrary Code Execution in Kubernetes Ingress-Nginx via Malicious Auth-URL Annotation

A security vulnerability exists in ingress-nginx where the `auth-url` Ingress annotation can be exploited to inject configuration into nginx. This vulnerability allows an attacker to execute arbitrary code within the ingress-nginx controller context and potentially disclose Secrets that are accessible to the controller. In the default installation, the controller has access to Secrets across the entire cluster, which increases the potential impact of this security issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kubernetes ingress-nginx

Mailing Lists

On Mon, Mar 24, 2025 at 02:38:17PM -0500, Tabitha Sable wrote: Apparently these versions have not been released yet[0] So for the moment, only the partial mitigation can be done [0]: githubcom/kubernetes/kubernetes/issues/131005#issuecomment-2749372605 ...
Hello oss-sec, Multiple issues have been discovered in ingress-nginx that can result in arbitrary code execution in the context of the ingress-nginx controller This can lead to disclosure of Secrets accessible to the controller (Note that in the default installation, the controller can access all Secrets cluster-wide) The most serious of these ...

Github Repositories

Proof-of-Concept Tool to detect IngressNightmare (CVE-2025-1974) via (non-intrusive) active means.

IngressNightmare Detection Tool Overview This tool provides a non-intrusive detection capability for the IngressNightmare vulnerability chain (CVE-2025-1974) affecting Ingress NGINX Controller It specifically leverages the auth-url annotation injection vector (CVE-2025-24514) to verify the presence of this critical vulnerability without executing arbitrary code Technical Back

Ingress Nightmare PoC

ingress-nightmare-poc Ingress Nightmare PoC - not an RCE, yet NGINX Configuration Injection Injections PoCs Configuration injection PoCs to exploit CVE-2025-1974, affected versions and prerequisites CVE PoC Affected Versions Notes CVE-2025-24514 auth-url-reviewjson < 1115 Can not exploit 112x deployments which run with --enable-annotation-validation by defa

Shodan Vulnerability Scanner Este script utiliza a API do Shodan para procurar por Vulnerabilidades recentes (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) descobertas em seu controlador de admissão podem levar ao acesso não autorizado a todos os segredos em namespaces e potencialmente permitir a aquisição completa do cluster Funciona

Ingress NGINX Vulnerability Checker Detection scripts for the Ingress NGINX Controller vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) Available Scripts This repository contains two vulnerability detection scripts: Internal Cluster Assessment (ingress_nginx_vuln_checkerpy) For users with kubectl access to their clusters Provides detailed versi

This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).

Exploit for Ingress NGINX - IngressNightmare This project provides an exploit targeting critical unauthenticated Remote Code Execution (RCE) vulnerabilities in the Ingress NGINX Controller for Kubernetes, collectively referred to as IngressNightmare (Research by Wiz) In the original research, the Wiz team did not provide a PoC or a functional exploit, so we decided to create o

This repo will give you the latest trending repo on github and giving you a grasp by sending email via Github Watching Features

🌟 Daily Trending Repositories πŸ“‹ About This project automatically tracks and curates trending repositories from GitHub daily Stay updated with the most exciting new projects in the developer community! With AI Summarization, you can get the summary of the repository by seeing the READMEmd file as well! πŸ”₯ Features πŸ”„ Weekly Updates

Recent Articles

Public-facing Kubernetes clusters at risk of takeover thanks to Ingress-Nginx flaw
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources How many K8s systems are sat on the internet front porch like that ... Oh, thousands, apparently

Cloudy infosec outfit Wiz has discovered serious vulnerabilities in the admission controller component of Ingress-Nginx Controller that could allow the total takeover of Kubernetes clusters – and thinks more than 6,000 deployments of the software are at risk on the internet. Kubernetes (K8s) clusters are exposed more often than you might think to external HTTP/S traffic, to allow outside access to the applications they run. Putting the cluster admission controller out there, too, doesn't seem ...