A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-05
https://www.theregister.com/2025/03/25/kubernetes_flaw_rce_risk/
https://thehackernews.com/2025/03/critical-ingress-nginx-controller.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1974
https://aws.amazon.com/security/security-bulletins/AWS-2025-006/
Published: 2025-03-25
Updated: 2025-03-27
Named Vulnerability: IngressNightmare
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.26447
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored