Remote Code Execution Vulnerabilities in Ingress NGINX | Wiz Blog

The blog outlines several critical unauthenticated Remote Code Execution vulnerabilities found in Ingress NGINX Controller for Kubernetes, collectively dubbed #IngressNightmare. These vulnerabilities can grant attackers unauthorized access to all secrets within a Kubernetes cluster, risking complete takeover. With a CVSS v3.1 score of 9.8, it is estimated that 43% of cloud environments, including many Fortune 500 companies, are at risk. Patching is highly recommended. Affected: Kubernetes, Ingress NGINX Controller

Keypoints :

  • Discovery of CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974 vulnerabilities.
  • These vulnerabilities allow unauthorized access to secret data and potential cluster takeover.
  • Approximately 43% of cloud environments are vulnerable, impacting many public-facing Kubernetes clusters.
  • Ingress NGINX Controller is widely used and is crucial for routing external traffic to Kubernetes services.
  • Vulnerabilities arise from the admission controller’s accessibility and the configuration validation process.
  • Patching is advised with specific recommended versions to mitigate risks.
  • Research findings are shared to strengthen overall cloud security practices.

Full Story: https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities