Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1097: CWE-20 Improper Input Validation in kubernetes ingress-nginx

0
High
VulnerabilityCVE-2025-1097cvecve-2025-1097cwe-20
Published: Mon Mar 24 2025 (03/24/2025, 23:29:05 UTC)
Source: CVE Database V5
Vendor/Project: kubernetes
Product: ingress-nginx

Description

A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

AI-Powered Analysis

AILast updated: 11/04/2025, 01:04:30 UTC

Technical Analysis

CVE-2025-1097 is a vulnerability identified in the Kubernetes ingress-nginx controller, specifically affecting versions up to 1.12.0. The root cause is improper input validation (CWE-20) of the 'auth-tls-match-cn' Ingress annotation, which is intended to specify client certificate common names for TLS authentication. An attacker with limited privileges can craft malicious Ingress resources that inject arbitrary configuration directives into the nginx configuration managed by the ingress-nginx controller. This injection can lead to arbitrary code execution within the controller's process context, which runs with cluster-level permissions. Furthermore, since the ingress-nginx controller typically has access to all Kubernetes Secrets cluster-wide by default, exploitation can result in unauthorized disclosure of sensitive data such as credentials, tokens, or certificates stored as Secrets. The vulnerability is remotely exploitable over the network without user interaction but requires some level of privileges (PR:L) to create or modify Ingress resources. Although no active exploits have been reported, the potential impact is significant due to the combination of code execution and sensitive data exposure. The vulnerability was reserved in early February 2025 and published in late March 2025, with a CVSS v3.1 score of 8.8, indicating high severity. No official patches were linked at the time of reporting, but remediation is expected in future ingress-nginx releases. The issue highlights the risks of insufficient input validation in Kubernetes controllers and the importance of least privilege principles in RBAC configurations.

Potential Impact

For European organizations, the impact of CVE-2025-1097 is substantial. Many enterprises and public sector entities in Europe rely heavily on Kubernetes for cloud-native application deployment, with ingress-nginx being one of the most popular ingress controllers. Successful exploitation could allow attackers to execute arbitrary code within the ingress-nginx controller, potentially leading to full cluster compromise. The disclosure of Secrets could expose sensitive credentials, private keys, and tokens, undermining confidentiality and enabling further lateral movement or privilege escalation. This is particularly critical for sectors such as finance, healthcare, and government, where data protection regulations like GDPR impose strict requirements on data confidentiality and breach notification. The availability of services could also be disrupted if attackers manipulate ingress configurations or cause controller failures. Given the default broad Secret access by the controller, organizations that have not implemented strict RBAC policies or network segmentation are at higher risk. The threat also raises concerns about supply chain security and cloud infrastructure integrity across European cloud providers and enterprises.

Mitigation Recommendations

1. Upgrade ingress-nginx to a version later than 1.12.0 as soon as a patched release is available to address CVE-2025-1097. 2. Implement strict RBAC policies to minimize the ingress-nginx controller's access to Kubernetes Secrets, limiting it to only those necessary for operation rather than cluster-wide access. 3. Enforce validation and sanitization of Ingress annotations, particularly 'auth-tls-match-cn', through admission controllers or policy enforcement tools like OPA Gatekeeper or Kyverno to prevent injection of malicious configuration. 4. Monitor Kubernetes API server logs and ingress-nginx controller logs for suspicious creation or modification of Ingress resources with unusual annotation values. 5. Use network policies to restrict access to the ingress-nginx controller and limit exposure to untrusted networks. 6. Conduct regular security audits and penetration testing focused on Kubernetes ingress configurations and controller privileges. 7. Educate DevOps and security teams about the risks of annotation injection and the importance of least privilege principles in Kubernetes environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
kubernetes
Date Reserved
2025-02-07T00:11:49.551Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091a49c28fd46ded81d02f

Added to database: 11/3/2025, 9:10:33 PM

Last enriched: 11/4/2025, 1:04:30 AM

Last updated: 12/20/2025, 2:15:59 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats