Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24514: CWE-20 Improper Input Validation in kubernetes ingress-nginx

0
High
VulnerabilityCVE-2025-24514cvecve-2025-24514cwe-20
Published: Mon Mar 24 2025 (03/24/2025, 23:29:36 UTC)
Source: CVE Database V5
Vendor/Project: kubernetes
Product: ingress-nginx

Description

A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

AI-Powered Analysis

AILast updated: 02/05/2026, 08:07:53 UTC

Technical Analysis

CVE-2025-24514 is a vulnerability classified under CWE-20 (Improper Input Validation) found in the Kubernetes ingress-nginx controller, specifically affecting versions from initial releases up to 1.12.0. The issue stems from insufficient validation of the 'auth-url' annotation in Ingress resource definitions. This annotation is intended to specify an external authentication URL, but due to improper sanitization, an attacker with privileges to create or modify Ingress resources can inject arbitrary configuration directives into the nginx configuration generated by the ingress controller. This injection can lead to arbitrary code execution within the ingress-nginx controller's runtime environment. Additionally, because the ingress-nginx controller typically runs with permissions that allow it to access all Kubernetes Secrets cluster-wide, an attacker can leverage this flaw to disclose sensitive information stored as Secrets. The vulnerability has a CVSS v3.1 score of 8.8, indicating high severity, with attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. The flaw is critical because ingress-nginx is widely used in Kubernetes clusters to manage external access, and the ability to execute arbitrary code or access Secrets can lead to full cluster compromise. No patches were listed at the time of publication, and no known exploits have been reported in the wild, but the risk remains significant given the nature of the flaw and the typical permissions of the ingress controller.

Potential Impact

For European organizations relying on Kubernetes with ingress-nginx for managing external traffic, this vulnerability poses a severe risk. Exploitation could lead to unauthorized access to sensitive data, including credentials and configuration secrets, potentially enabling lateral movement within the cluster and beyond. The arbitrary code execution capability could allow attackers to deploy malicious workloads, disrupt services, or exfiltrate data, impacting confidentiality, integrity, and availability of critical applications. Given the widespread adoption of Kubernetes in European enterprises and public sector organizations, especially in finance, healthcare, and government, the impact could be substantial. Regulatory compliance risks also arise due to potential data breaches involving personal or sensitive information protected under GDPR. The cluster-wide access to Secrets by the ingress controller amplifies the severity, as attackers could gain control over multiple services and data stores. Operational disruptions could lead to financial losses, reputational damage, and legal consequences.

Mitigation Recommendations

European organizations should prioritize upgrading ingress-nginx to a version beyond 1.12.0 where this vulnerability is addressed once patches are available. Until then, strict RBAC policies should be enforced to limit who can create or modify Ingress resources, minimizing the risk of malicious annotation injection. Implement admission controllers or webhook policies to validate and sanitize Ingress annotations, especially 'auth-url', preventing unauthorized or malformed inputs. Restrict the permissions of the ingress-nginx controller to the minimum necessary, avoiding cluster-wide access to Secrets if possible, by employing Kubernetes Pod Security Policies or OPA Gatekeeper policies. Monitor ingress-nginx logs and Kubernetes audit logs for suspicious Ingress resource changes or anomalous behavior. Employ network segmentation and isolate critical clusters to reduce blast radius. Regularly review and rotate Secrets to limit exposure duration. Finally, maintain an incident response plan tailored for Kubernetes environments to quickly address potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
kubernetes
Date Reserved
2025-01-23T00:50:17.929Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091e18c28fd46ded86986d

Added to database: 11/3/2025, 9:26:48 PM

Last enriched: 2/5/2026, 8:07:53 AM

Last updated: 2/7/2026, 1:27:36 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats