Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1974: CWE-653 Improper Isolation or Compartmentalization in kubernetes ingress-nginx

0
Critical
VulnerabilityCVE-2025-1974cvecve-2025-1974cwe-653
Published: Mon Mar 24 2025 (03/24/2025, 23:28:48 UTC)
Source: CVE Database V5
Vendor/Project: kubernetes
Product: ingress-nginx

Description

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:27:37 UTC

Technical Analysis

CVE-2025-1974 is a critical security vulnerability identified in the Kubernetes ingress-nginx controller, a widely used component responsible for managing external access to services within Kubernetes clusters. The flaw is categorized under CWE-653, indicating improper isolation or compartmentalization. Specifically, under certain conditions, an unauthenticated attacker who has access to the pod network can execute arbitrary code within the ingress-nginx controller's context. This is particularly dangerous because the ingress-nginx controller, by default, has access to all Secrets cluster-wide, which often include sensitive credentials, tokens, and configuration data. The vulnerability affects all versions up to and including 1.12.0. The attack vector requires no authentication (AV:N), no privileges (PR:N), and no user interaction (UI:N), making it trivially exploitable by anyone with pod network access. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), resulting in a CVSS v3.1 score of 9.8. Although no known exploits have been reported in the wild yet, the potential for widespread damage is significant given the default permissions of the ingress-nginx controller and the critical role it plays in Kubernetes networking. The vulnerability highlights a fundamental security design issue in the isolation mechanisms of the ingress-nginx controller, allowing attackers to break out of expected boundaries and compromise cluster secrets and control plane components.

Potential Impact

The impact of CVE-2025-1974 is severe for organizations running Kubernetes clusters with ingress-nginx controllers. Successful exploitation allows attackers to execute arbitrary code in the ingress-nginx controller context, leading to full compromise of the controller. Since the controller has access to all cluster-wide Secrets by default, attackers can exfiltrate sensitive data such as credentials, API tokens, and private keys, potentially enabling further lateral movement and privilege escalation within the cluster. This can result in data breaches, service disruption, and loss of integrity of critical infrastructure. The availability of services managed by ingress-nginx may also be disrupted, causing denial of service. Given the widespread adoption of Kubernetes in cloud-native environments, this vulnerability poses a global risk to cloud service providers, enterprises, and managed service providers relying on Kubernetes for application deployment and management. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where pod network access is not tightly controlled.

Mitigation Recommendations

To mitigate CVE-2025-1974, organizations should immediately upgrade ingress-nginx controllers to a patched version beyond 1.12.0 once available. Until patches are released, implement strict network segmentation to restrict pod network access only to trusted entities, minimizing exposure to unauthenticated attackers. Employ Kubernetes Network Policies to limit communication to the ingress-nginx pods. Review and reduce the permissions granted to the ingress-nginx controller, especially its access to Secrets, by adopting the principle of least privilege and using Role-Based Access Control (RBAC) to restrict Secret access scope. Enable audit logging to detect anomalous access patterns to ingress-nginx and Secrets. Consider deploying runtime security tools that monitor and restrict code execution within ingress-nginx pods. Regularly scan clusters for outdated ingress-nginx versions and vulnerable configurations. Finally, educate DevOps and security teams about the risks of pod network exposure and enforce secure cluster design principles to prevent unauthorized pod network access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
kubernetes
Date Reserved
2025-03-04T21:34:07.543Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091a4ac28fd46ded81d089

Added to database: 11/3/2025, 9:10:34 PM

Last enriched: 2/26/2026, 11:27:37 PM

Last updated: 3/24/2026, 10:11:04 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses