CVE-2025-15566: CWE-20 Improper Input Validation in Kubernetes ingress-nginx
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-proxy-set-headers` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
AI Analysis
Technical Summary
CVE-2025-15566 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting the ingress-nginx controller in Kubernetes. The issue arises from insufficient validation of the 'nginx.ingress.kubernetes.io/auth-proxy-set-headers' Ingress annotation, which attackers can manipulate to inject arbitrary nginx configuration directives. This injection capability can be leveraged to execute arbitrary code within the ingress-nginx controller process, which typically runs with elevated privileges and has access to all Kubernetes Secrets cluster-wide by default. The vulnerability is exploitable remotely (AV:N) with low attack complexity (AC:L) but requires some privileges (PR:L), such as the ability to create or modify Ingress resources. No user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact is severe, affecting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the ingress-nginx controller is a critical component in Kubernetes environments, widely deployed for managing external access to services. Exploitation could lead to full cluster compromise, data leakage of sensitive credentials, and disruption of service. The vulnerability was published in early 2026, and no official patches or mitigations are listed yet, emphasizing the need for immediate attention from Kubernetes administrators.
Potential Impact
The potential impact of CVE-2025-15566 is substantial for organizations running Kubernetes clusters using ingress-nginx. Successful exploitation can lead to arbitrary code execution within the ingress controller, enabling attackers to escalate privileges, move laterally within the cluster, and potentially compromise the entire Kubernetes environment. The disclosure of all cluster-wide Secrets accessible to the ingress controller can expose sensitive credentials, tokens, and configuration data, risking further compromise of connected systems and services. This can result in data breaches, service outages, and loss of trust. Given the ingress-nginx controller's role in managing external traffic, attackers could also manipulate ingress rules to redirect or intercept traffic, facilitating man-in-the-middle attacks or denial of service. Organizations relying on Kubernetes for critical workloads, especially those in regulated industries or with sensitive data, face significant operational and compliance risks if this vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-15566, organizations should immediately review and restrict permissions related to Ingress resource creation and modification, limiting them to trusted administrators only. Implement strict admission controls and validation policies using Kubernetes Admission Controllers or Open Policy Agent (OPA) to detect and block malicious annotations like 'auth-proxy-set-headers' injection attempts. Monitor ingress-nginx controller logs and Kubernetes audit logs for unusual configuration changes or suspicious activity. If possible, isolate the ingress-nginx controller's access to Secrets by applying the principle of least privilege, restricting its service account permissions to only necessary Secrets rather than cluster-wide access. Stay updated with Kubernetes and ingress-nginx project releases and apply patches promptly once available. Consider deploying network segmentation and runtime security tools to detect anomalous behavior in the ingress controller. Additionally, conduct regular security assessments and penetration testing focused on Kubernetes ingress configurations to identify and remediate similar risks proactively.
Affected Countries
United States, Germany, China, India, United Kingdom, Japan, Canada, Australia, France, Netherlands
CVE-2025-15566: CWE-20 Improper Input Validation in Kubernetes ingress-nginx
Description
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-proxy-set-headers` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15566 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting the ingress-nginx controller in Kubernetes. The issue arises from insufficient validation of the 'nginx.ingress.kubernetes.io/auth-proxy-set-headers' Ingress annotation, which attackers can manipulate to inject arbitrary nginx configuration directives. This injection capability can be leveraged to execute arbitrary code within the ingress-nginx controller process, which typically runs with elevated privileges and has access to all Kubernetes Secrets cluster-wide by default. The vulnerability is exploitable remotely (AV:N) with low attack complexity (AC:L) but requires some privileges (PR:L), such as the ability to create or modify Ingress resources. No user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact is severe, affecting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the ingress-nginx controller is a critical component in Kubernetes environments, widely deployed for managing external access to services. Exploitation could lead to full cluster compromise, data leakage of sensitive credentials, and disruption of service. The vulnerability was published in early 2026, and no official patches or mitigations are listed yet, emphasizing the need for immediate attention from Kubernetes administrators.
Potential Impact
The potential impact of CVE-2025-15566 is substantial for organizations running Kubernetes clusters using ingress-nginx. Successful exploitation can lead to arbitrary code execution within the ingress controller, enabling attackers to escalate privileges, move laterally within the cluster, and potentially compromise the entire Kubernetes environment. The disclosure of all cluster-wide Secrets accessible to the ingress controller can expose sensitive credentials, tokens, and configuration data, risking further compromise of connected systems and services. This can result in data breaches, service outages, and loss of trust. Given the ingress-nginx controller's role in managing external traffic, attackers could also manipulate ingress rules to redirect or intercept traffic, facilitating man-in-the-middle attacks or denial of service. Organizations relying on Kubernetes for critical workloads, especially those in regulated industries or with sensitive data, face significant operational and compliance risks if this vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-15566, organizations should immediately review and restrict permissions related to Ingress resource creation and modification, limiting them to trusted administrators only. Implement strict admission controls and validation policies using Kubernetes Admission Controllers or Open Policy Agent (OPA) to detect and block malicious annotations like 'auth-proxy-set-headers' injection attempts. Monitor ingress-nginx controller logs and Kubernetes audit logs for unusual configuration changes or suspicious activity. If possible, isolate the ingress-nginx controller's access to Secrets by applying the principle of least privilege, restricting its service account permissions to only necessary Secrets rather than cluster-wide access. Stay updated with Kubernetes and ingress-nginx project releases and apply patches promptly once available. Consider deploying network segmentation and runtime security tools to detect anomalous behavior in the ingress controller. Additionally, conduct regular security assessments and penetration testing focused on Kubernetes ingress configurations to identify and remediate similar risks proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- kubernetes
- Date Reserved
- 2026-02-05T23:44:40.775Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69856acdf9fa50a62fd0a375
Added to database: 2/6/2026, 4:15:09 AM
Last enriched: 2/27/2026, 7:11:50 AM
Last updated: 3/24/2026, 1:02:27 AM
Views: 252
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.