Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2025-24514 — Improper Input Validation in Ingress-nginx
Severity
8.8HIGHNVD
EPSS
23.0%
top 4.08%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 25
Latest updateFeb 4
Description
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
4OSV
▶
GHSA
▶
OSV▶
ingress-nginx controller - configuration injection via unsanitized auth-url annotation in k8s.io/ingress-nginx↗2025-03-25
CVEList
▶
💥Exploits & PoCs
2Nuclei▶
Ingress-Nginx Controller - Configuration Injection via Unsanitized `auth-url` Annotation
🔍Detection Rules
1Suricata▶
ET WEB_SERVER Kubernetes Ingress NGINX Controller auth-url Annotation Injection (CVE-2025-24514)↗2025-03-25
📋Vendor Advisories
4Red Hat▶
ingress-nginx: ingress-nginx controller - configuration injection via unsanitized auth-url annotation↗2025-03-24