A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where attacker-provided data are included in a filename by the ingress-nginx Admission Controller feature, resulting in directory traversal within the container. This could result in denial of service, or when combined with other vulnerabilities, limited disclosure of Secret objects from the cluster.
https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-05
https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities
https://www.theregister.com/2025/03/25/kubernetes_flaw_rce_risk/
https://thehackernews.com/2025/03/critical-ingress-nginx-controller.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1974
https://aws.amazon.com/security/security-bulletins/AWS-2025-006/
Published: 2025-03-25
Updated: 2025-03-27
Named Vulnerability: IngressNightmare
Base Score: 4
Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:P
Severity: Medium
Base Score: 4.8
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
Severity: Medium
EPSS: 0.00166
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored