Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14727: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in F5 NGINX Ingress Controller

0
High
VulnerabilityCVE-2025-14727cvecve-2025-14727cwe-22
Published: Wed Dec 17 2025 (12/17/2025, 15:48:22 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: NGINX Ingress Controller

Description

A vulnerability exists in NGINX Ingress Controller's nginx.org/rewrite-target annotation validation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 12/17/2025, 16:07:10 UTC

Technical Analysis

CVE-2025-14727 is a path traversal vulnerability identified in the F5 NGINX Ingress Controller version 5.3.0, specifically related to the improper validation of the nginx.org/rewrite-target annotation. This annotation is used to rewrite request URIs in ingress rules, but due to insufficient validation, attackers can craft malicious inputs that traverse directories outside the intended restricted paths. This CWE-22 vulnerability allows an attacker with network access and low privileges (PR:L) to manipulate pathnames, potentially accessing or modifying sensitive files on the underlying system. The vulnerability does not require user interaction (UI:N) and affects confidentiality and integrity significantly (C:H/I:H), with a limited impact on availability (A:L). The flaw arises because the ingress controller fails to properly limit pathname resolution, enabling attackers to bypass directory restrictions. Although no known exploits are currently in the wild, the high CVSS score (8.3) indicates a serious risk, especially in environments where ingress controllers manage critical traffic routing in Kubernetes clusters. The vulnerability is relevant only to supported versions, excluding those past End of Technical Support. No patches were listed at the time of publication, so mitigation relies on configuration hardening and monitoring until updates are released.

Potential Impact

For European organizations, the impact of CVE-2025-14727 can be substantial, particularly for those relying on Kubernetes clusters with F5 NGINX Ingress Controller version 5.3.0. Successful exploitation could lead to unauthorized disclosure of sensitive data, modification of configuration or application files, and potential lateral movement within networks. This threatens confidentiality and integrity of critical systems, potentially disrupting business operations and violating data protection regulations such as GDPR. The limited availability impact reduces the risk of outright denial of service but does not diminish the severity of data compromise. Organizations in sectors like finance, healthcare, and government, which heavily use cloud-native infrastructure, are at heightened risk. The vulnerability's exploitation could also undermine trust in managed services and cloud providers that utilize this ingress controller. Given the network-level attack vector and low privilege requirement, attackers could leverage this flaw to escalate privileges or implant persistent threats within European enterprise environments.

Mitigation Recommendations

1. Monitor F5 and NGINX advisories closely and apply official patches or updates as soon as they become available. 2. Until patches are released, restrict or disable the use of the nginx.org/rewrite-target annotation in ingress configurations, especially in untrusted namespaces or by untrusted users. 3. Implement strict Role-Based Access Control (RBAC) policies to limit who can create or modify ingress resources with rewrite annotations. 4. Use admission controllers or policy enforcement tools (e.g., OPA Gatekeeper) to validate ingress annotations and reject potentially malicious configurations. 5. Conduct thorough logging and monitoring of ingress controller activity to detect anomalous path traversal attempts. 6. Harden the underlying Kubernetes nodes and file system permissions to minimize the impact of any unauthorized file access. 7. Educate DevOps and security teams about the risks associated with ingress annotations and path traversal vulnerabilities. 8. Consider network segmentation and zero-trust principles to limit attacker movement if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
f5
Date Reserved
2025-12-15T16:22:28.776Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6942d1adb2cbfb3efaa33d25

Added to database: 12/17/2025, 3:52:13 PM

Last enriched: 12/17/2025, 4:07:10 PM

Last updated: 12/18/2025, 7:36:17 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats