Arbitrary Code Execution Vulnerability in nginx Ingress Controller by Kubernetes
CVE-2025-24514
Key Information:
- Vendor
- Kubernetes
- Status
- Ingress-nginx
- Vendor
- CVE Published:
- 25 March 2025
Badges
What is CVE-2025-24514?
CVE-2025-24514 is a critical vulnerability found in the nginx Ingress Controller used with Kubernetes, a popular platform for managing containerized applications. This vulnerability arises from a flaw in how the auth-url
Ingress annotation is handled, potentially allowing attackers to inject malicious configurations into nginx. If exploited, this could lead to arbitrary code execution within the ingress-nginx controller, severely compromising the security of an organization's Kubernetes environment. Given that the controller can access all Secrets cluster-wide in its default installation, this vulnerability could expose sensitive information and disrupt operations.
Technical Details
CVE-2025-24514 is categorized as an Arbitrary Code Execution vulnerability. The core issue lies in the injection capabilities provided through the auth-url
Ingress annotation, which is meant to enhance security via external authentication mechanisms. However, due to improper handling, this functionality can be manipulated by an attacker to run unauthorized code within the context of the ingress-nginx controller. The vulnerability permits access to Secrets that the controller can reach, raising significant security concerns regarding data confidentiality and system integrity.
Potential Impact of CVE-2025-24514
-
Arbitrary Code Execution: The primary risk associated with this vulnerability is the potential for attackers to execute arbitrary code on the ingress-nginx controller. This could lead to unauthorized access or control over the Kubernetes infrastructure, allowing for malicious activities such as deploying malware or exfiltrating data.
-
Data Breach: Given that the ingress-nginx controller can access all Secrets cluster-wide by default, exploitation of this vulnerability might lead to the disclosure of sensitive information, including passwords and API keys. This could substantially compromise an organization's security posture and lead to further attacks.
-
Operational Disruption: The ability to inject configurations and execute malicious code can disrupt the normal functioning of services managed by the ingress-nginx controller. Such disruptions could result in downtime for critical applications, directly impacting business operations and potentially leading to financial losses.
Affected Version(s)
ingress-nginx 0 <= 1.11.4
ingress-nginx 1.12.0
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
String of defects in popular Kubernetes component puts 40% of cloud environments at risk
Researchers aren’t aware of active exploitation in the wild, but they warn the risk for publicly exposed and unpatched Ingress Nginx controllers is extremely high.
5 days ago
Ingress NGINX RCE Vulnerability Allows Attackers to Compromise Entire Cluster
A series of remote code execution (RCE) vulnerabilities known as "IngressNightmare" have been discovered in the Ingress NGINX Controller for Kubernetes.
6 days ago
References
CVSS V3.1
Timeline
- 📰
First article discovered by GBHackers News
Vulnerability published