CVE-2026-23742: CWE-94: Improper Control of Generation of Code ('Code Injection') in zalando skipper
CVE-2026-23742 is a high-severity code injection vulnerability in Zalando's Skipper HTTP router and reverse proxy versions prior to 0. 23. 0. The vulnerability arises from the default configuration allowing inline Lua scripts (-lua-sources=inline,file), which can be exploited if untrusted users can create Lua filters, for example via Kubernetes Ingress resources. Exploitation enables attackers with limited privileges to execute arbitrary Lua code, potentially reading the filesystem accessible to the Skipper process, including sensitive logs and secrets. This can lead to full compromise of confidentiality, integrity, and availability of the affected system. The vulnerability requires at least low privileges (PR:L) but no user interaction and can be exploited remotely over the network. The issue is fixed in version 0. 23. 0.
AI Analysis
Technical Summary
Zalando's Skipper is an HTTP router and reverse proxy widely used for service composition, often deployed in Kubernetes environments. Versions prior to 0.23.0 have a default configuration enabling Lua scripting from inline sources (-lua-sources=inline,file). This configuration flaw allows users who can create Lua filters—potentially through Kubernetes Ingress resources—to inject arbitrary Lua code. Since Lua scripts run with the privileges of the Skipper process, an attacker can read any files accessible to Skipper, including sensitive logs and secrets stored on the filesystem. This represents a classic code injection vulnerability (CWE-94) combined with improper access control (CWE-250) and information exposure (CWE-522). The vulnerability requires the attacker to have at least low privileges (PR:L) but no user interaction is needed, and it can be exploited remotely (AV:N). The impact includes full compromise of confidentiality, integrity, and availability of the affected system. The vulnerability was assigned CVE-2026-23742 and has a CVSS v3.1 score of 8.8, indicating high severity. The issue was resolved in Skipper version 0.23.0 by disabling inline Lua sources by default, preventing untrusted users from injecting Lua code. No known exploits are currently reported in the wild, but the potential impact is significant given the nature of the vulnerability and the common use of Skipper in cloud-native environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those leveraging Kubernetes and microservices architectures where Skipper is used as an ingress controller or reverse proxy. Exploitation can lead to unauthorized disclosure of sensitive data, including secrets and logs, potentially exposing credentials, tokens, or other confidential information. Attackers could also manipulate or disrupt service routing, impacting availability and integrity of services. This could result in data breaches, service outages, and compliance violations under GDPR and other data protection regulations. Organizations in sectors such as finance, healthcare, and critical infrastructure are particularly vulnerable due to the sensitivity of their data and the criticality of their services. The ease of remote exploitation without user interaction increases the threat level, making timely patching and configuration hardening essential to prevent compromise.
Mitigation Recommendations
1. Upgrade all Skipper deployments to version 0.23.0 or later, where the vulnerability is fixed by disabling inline Lua sources by default. 2. Restrict the ability to create or modify Lua filters to trusted administrators only, especially in Kubernetes Ingress configurations. 3. Implement strict RBAC policies in Kubernetes to prevent untrusted users from injecting Lua scripts or modifying ingress resources. 4. Monitor and audit Skipper logs and Kubernetes ingress configurations for unauthorized changes or suspicious Lua filter creation. 5. Use network segmentation and firewall rules to limit access to Skipper management interfaces. 6. Employ runtime security tools to detect anomalous Lua script executions or filesystem access patterns by the Skipper process. 7. Regularly review and rotate secrets accessible to Skipper to minimize exposure in case of compromise. 8. Conduct penetration testing and vulnerability scanning focused on ingress controllers and reverse proxies to detect similar misconfigurations or vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland
CVE-2026-23742: CWE-94: Improper Control of Generation of Code ('Code Injection') in zalando skipper
Description
CVE-2026-23742 is a high-severity code injection vulnerability in Zalando's Skipper HTTP router and reverse proxy versions prior to 0. 23. 0. The vulnerability arises from the default configuration allowing inline Lua scripts (-lua-sources=inline,file), which can be exploited if untrusted users can create Lua filters, for example via Kubernetes Ingress resources. Exploitation enables attackers with limited privileges to execute arbitrary Lua code, potentially reading the filesystem accessible to the Skipper process, including sensitive logs and secrets. This can lead to full compromise of confidentiality, integrity, and availability of the affected system. The vulnerability requires at least low privileges (PR:L) but no user interaction and can be exploited remotely over the network. The issue is fixed in version 0. 23. 0.
AI-Powered Analysis
Technical Analysis
Zalando's Skipper is an HTTP router and reverse proxy widely used for service composition, often deployed in Kubernetes environments. Versions prior to 0.23.0 have a default configuration enabling Lua scripting from inline sources (-lua-sources=inline,file). This configuration flaw allows users who can create Lua filters—potentially through Kubernetes Ingress resources—to inject arbitrary Lua code. Since Lua scripts run with the privileges of the Skipper process, an attacker can read any files accessible to Skipper, including sensitive logs and secrets stored on the filesystem. This represents a classic code injection vulnerability (CWE-94) combined with improper access control (CWE-250) and information exposure (CWE-522). The vulnerability requires the attacker to have at least low privileges (PR:L) but no user interaction is needed, and it can be exploited remotely (AV:N). The impact includes full compromise of confidentiality, integrity, and availability of the affected system. The vulnerability was assigned CVE-2026-23742 and has a CVSS v3.1 score of 8.8, indicating high severity. The issue was resolved in Skipper version 0.23.0 by disabling inline Lua sources by default, preventing untrusted users from injecting Lua code. No known exploits are currently reported in the wild, but the potential impact is significant given the nature of the vulnerability and the common use of Skipper in cloud-native environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those leveraging Kubernetes and microservices architectures where Skipper is used as an ingress controller or reverse proxy. Exploitation can lead to unauthorized disclosure of sensitive data, including secrets and logs, potentially exposing credentials, tokens, or other confidential information. Attackers could also manipulate or disrupt service routing, impacting availability and integrity of services. This could result in data breaches, service outages, and compliance violations under GDPR and other data protection regulations. Organizations in sectors such as finance, healthcare, and critical infrastructure are particularly vulnerable due to the sensitivity of their data and the criticality of their services. The ease of remote exploitation without user interaction increases the threat level, making timely patching and configuration hardening essential to prevent compromise.
Mitigation Recommendations
1. Upgrade all Skipper deployments to version 0.23.0 or later, where the vulnerability is fixed by disabling inline Lua sources by default. 2. Restrict the ability to create or modify Lua filters to trusted administrators only, especially in Kubernetes Ingress configurations. 3. Implement strict RBAC policies in Kubernetes to prevent untrusted users from injecting Lua scripts or modifying ingress resources. 4. Monitor and audit Skipper logs and Kubernetes ingress configurations for unauthorized changes or suspicious Lua filter creation. 5. Use network segmentation and firewall rules to limit access to Skipper management interfaces. 6. Employ runtime security tools to detect anomalous Lua script executions or filesystem access patterns by the Skipper process. 7. Regularly review and rotate secrets accessible to Skipper to minimize exposure in case of compromise. 8. Conduct penetration testing and vulnerability scanning focused on ingress controllers and reverse proxies to detect similar misconfigurations or vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-15T15:45:01.958Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696a9dd0b22c7ad868e95251
Added to database: 1/16/2026, 8:21:36 PM
Last enriched: 1/23/2026, 8:38:40 PM
Last updated: 2/5/2026, 11:05:40 PM
Views: 89
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighCVE-2026-24300: CWE-284: Improper Access Control in Microsoft Azure Front Door
CriticalCVE-2026-21532: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Azure Functions
HighCVE-2026-0391: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2026-1970: Open Redirect in Edimax BR-6258n
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.