Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15566: CWE-20 Improper Input Validation in Kubernetes ingress-nginx

0
High
VulnerabilityCVE-2025-15566cvecve-2025-15566cwe-20
Published: Fri Feb 06 2026 (02/06/2026, 03:13:51 UTC)
Source: CVE Database V5
Vendor/Project: Kubernetes
Product: ingress-nginx

Description

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-proxy-set-headers` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

AI-Powered Analysis

AILast updated: 02/06/2026, 04:29:29 UTC

Technical Analysis

CVE-2025-15566 is a vulnerability in the Kubernetes ingress-nginx controller related to improper input validation (CWE-20) of the `nginx.ingress.kubernetes.io/auth-proxy-set-headers` Ingress annotation. This annotation is intended to set headers for authentication proxying, but due to insufficient validation, it can be manipulated to inject arbitrary configuration directives into the nginx configuration managed by the ingress controller. Because the ingress-nginx controller runs with elevated privileges and typically has cluster-wide access to Kubernetes Secrets, an attacker exploiting this vulnerability can execute arbitrary code within the ingress controller's context. This can lead to full compromise of the ingress controller pod, unauthorized disclosure of sensitive Secrets, and potentially lateral movement within the cluster. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its network attack vector, low attack complexity, requirement for privileges but no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the risk is significant given the widespread use of ingress-nginx in Kubernetes environments. The vulnerability affects all versions of ingress-nginx prior to the patch, and remediation requires updating to a fixed version once available or applying configuration restrictions to prevent misuse of the vulnerable annotation.

Potential Impact

For European organizations, this vulnerability poses a critical risk to Kubernetes clusters that use ingress-nginx for managing external access. Exploitation could lead to unauthorized disclosure of sensitive data stored in Kubernetes Secrets, including credentials, tokens, and certificates, potentially impacting data privacy and regulatory compliance such as GDPR. Arbitrary code execution within the ingress controller can disrupt service availability, cause data integrity issues, and enable attackers to pivot to other cluster components or workloads. Organizations in sectors like finance, healthcare, telecommunications, and critical infrastructure, which heavily rely on Kubernetes for scalable and secure application delivery, face heightened risks. The cluster-wide access of the ingress controller to Secrets exacerbates the potential damage. Additionally, the vulnerability could undermine trust in cloud-native deployments and complicate incident response due to the stealthy nature of configuration injection attacks.

Mitigation Recommendations

1. Immediately restrict or disable the use of the `nginx.ingress.kubernetes.io/auth-proxy-set-headers` annotation in Ingress resources unless absolutely necessary. 2. Implement strict admission controller policies or OPA Gatekeeper policies to validate and sanitize Ingress annotations to prevent malicious configuration injection. 3. Upgrade ingress-nginx to a patched version as soon as it becomes available from the Kubernetes project. 4. Limit the permissions of the ingress-nginx controller service account to the minimum necessary, avoiding cluster-wide Secret access if possible, using Kubernetes RBAC best practices. 5. Monitor ingress-nginx logs and Kubernetes audit logs for suspicious annotation changes or configuration reloads. 6. Employ network segmentation and restrict access to the ingress controller to trusted sources only. 7. Regularly scan Kubernetes clusters for misconfigurations and unauthorized resource changes. 8. Educate DevOps and security teams about the risks of annotation misuse and enforce secure deployment practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
kubernetes
Date Reserved
2026-02-05T23:44:40.775Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69856acdf9fa50a62fd0a375

Added to database: 2/6/2026, 4:15:09 AM

Last enriched: 2/6/2026, 4:29:29 AM

Last updated: 2/6/2026, 10:51:22 PM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats