Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15566: CWE-20 Improper Input Validation in Kubernetes ingress-nginx

0
High
VulnerabilityCVE-2025-15566cvecve-2025-15566cwe-20
Published: Fri Feb 06 2026 (02/06/2026, 03:13:51 UTC)
Source: CVE Database V5
Vendor/Project: Kubernetes
Product: ingress-nginx

Description

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-proxy-set-headers` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:11:50 UTC

Technical Analysis

CVE-2025-15566 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting the ingress-nginx controller in Kubernetes. The issue arises from insufficient validation of the 'nginx.ingress.kubernetes.io/auth-proxy-set-headers' Ingress annotation, which attackers can manipulate to inject arbitrary nginx configuration directives. This injection capability can be leveraged to execute arbitrary code within the ingress-nginx controller process, which typically runs with elevated privileges and has access to all Kubernetes Secrets cluster-wide by default. The vulnerability is exploitable remotely (AV:N) with low attack complexity (AC:L) but requires some privileges (PR:L), such as the ability to create or modify Ingress resources. No user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact is severe, affecting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the ingress-nginx controller is a critical component in Kubernetes environments, widely deployed for managing external access to services. Exploitation could lead to full cluster compromise, data leakage of sensitive credentials, and disruption of service. The vulnerability was published in early 2026, and no official patches or mitigations are listed yet, emphasizing the need for immediate attention from Kubernetes administrators.

Potential Impact

The potential impact of CVE-2025-15566 is substantial for organizations running Kubernetes clusters using ingress-nginx. Successful exploitation can lead to arbitrary code execution within the ingress controller, enabling attackers to escalate privileges, move laterally within the cluster, and potentially compromise the entire Kubernetes environment. The disclosure of all cluster-wide Secrets accessible to the ingress controller can expose sensitive credentials, tokens, and configuration data, risking further compromise of connected systems and services. This can result in data breaches, service outages, and loss of trust. Given the ingress-nginx controller's role in managing external traffic, attackers could also manipulate ingress rules to redirect or intercept traffic, facilitating man-in-the-middle attacks or denial of service. Organizations relying on Kubernetes for critical workloads, especially those in regulated industries or with sensitive data, face significant operational and compliance risks if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2025-15566, organizations should immediately review and restrict permissions related to Ingress resource creation and modification, limiting them to trusted administrators only. Implement strict admission controls and validation policies using Kubernetes Admission Controllers or Open Policy Agent (OPA) to detect and block malicious annotations like 'auth-proxy-set-headers' injection attempts. Monitor ingress-nginx controller logs and Kubernetes audit logs for unusual configuration changes or suspicious activity. If possible, isolate the ingress-nginx controller's access to Secrets by applying the principle of least privilege, restricting its service account permissions to only necessary Secrets rather than cluster-wide access. Stay updated with Kubernetes and ingress-nginx project releases and apply patches promptly once available. Consider deploying network segmentation and runtime security tools to detect anomalous behavior in the ingress controller. Additionally, conduct regular security assessments and penetration testing focused on Kubernetes ingress configurations to identify and remediate similar risks proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
kubernetes
Date Reserved
2026-02-05T23:44:40.775Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69856acdf9fa50a62fd0a375

Added to database: 2/6/2026, 4:15:09 AM

Last enriched: 2/27/2026, 7:11:50 AM

Last updated: 3/24/2026, 1:02:27 AM

Views: 252

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses