Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24514: CWE-20 Improper Input Validation in kubernetes ingress-nginx

0
High
VulnerabilityCVE-2025-24514cvecve-2025-24514cwe-20
Published: Mon Mar 24 2025 (03/24/2025, 23:29:36 UTC)
Source: CVE Database V5
Vendor/Project: kubernetes
Product: ingress-nginx

Description

A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

AI-Powered Analysis

AILast updated: 11/04/2025, 00:08:08 UTC

Technical Analysis

CVE-2025-24514 is a vulnerability classified under CWE-20 (Improper Input Validation) found in the Kubernetes ingress-nginx controller, specifically affecting versions from initial releases up to 1.12.0. The flaw exists in the handling of the `auth-url` annotation within Ingress resources, which is intended to configure external authentication for ingress traffic. Due to insufficient validation, an attacker with permissions to create or modify Ingress resources can inject arbitrary nginx configuration directives via this annotation. This injection can lead to arbitrary code execution within the ingress-nginx controller's runtime environment. Since the ingress-nginx controller typically runs with elevated privileges and has access to all Kubernetes Secrets cluster-wide by default, exploitation can also result in the disclosure of sensitive information such as credentials, tokens, and certificates. The vulnerability does not require user interaction and can be exploited remotely over the network, with only limited privileges needed to manipulate Ingress resources. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction. Although no public exploits have been reported yet, the potential for severe cluster compromise is significant. The vulnerability was publicly disclosed on March 24, 2025, and remediation involves upgrading ingress-nginx to a fixed version beyond 1.12.0 once available and applying strict RBAC policies to limit who can create or modify Ingress resources. Additionally, monitoring and auditing Ingress annotations for suspicious changes can help detect exploitation attempts.

Potential Impact

For European organizations relying on Kubernetes clusters with ingress-nginx controllers, this vulnerability poses a critical risk. Successful exploitation can lead to full compromise of the ingress-nginx controller, enabling attackers to execute arbitrary code and gain access to all Kubernetes Secrets accessible by the controller. This can result in leakage of sensitive data, including credentials and certificates, potentially allowing lateral movement within the cluster and beyond. The integrity of ingress traffic routing can be undermined, causing denial of service or traffic interception. Given the widespread adoption of Kubernetes in Europe across sectors such as finance, healthcare, and government, the impact could be severe, including data breaches, service outages, and regulatory non-compliance under GDPR. The ease of exploitation with minimal privileges and no user interaction increases the threat level, especially in multi-tenant or shared cluster environments common in European cloud deployments.

Mitigation Recommendations

1. Upgrade ingress-nginx to a version later than 1.12.0 where the vulnerability is patched as soon as such a release is available. 2. Implement strict Role-Based Access Control (RBAC) policies to restrict which users or service accounts can create or modify Ingress resources, minimizing the risk of malicious annotation injection. 3. Audit and monitor Ingress resource annotations regularly for unexpected or suspicious `auth-url` values or other configuration changes. 4. Use admission controllers or validating webhooks to enforce strict validation of Ingress annotations, rejecting any that do not conform to expected patterns. 5. Limit the privileges of the ingress-nginx controller itself where possible, for example by restricting its access to only necessary Secrets rather than cluster-wide access. 6. Employ network segmentation and zero-trust principles to reduce the blast radius if the ingress-nginx controller is compromised. 7. Maintain up-to-date backups and incident response plans specifically addressing Kubernetes cluster compromise scenarios. 8. Educate DevOps and security teams about this vulnerability and the importance of secure Ingress resource management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
kubernetes
Date Reserved
2025-01-23T00:50:17.929Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091e18c28fd46ded86986d

Added to database: 11/3/2025, 9:26:48 PM

Last enriched: 11/4/2025, 12:08:08 AM

Last updated: 11/5/2025, 2:04:47 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats