PT-2025-12715 · Kubernetes +1 · Ingress-Nginx +2

Nir Ohfeld

+2

·

Published

2025-03-23

·

Updated

2025-08-02

·

CVE-2025-1974

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

## Vulnerability Report

**Name of the Vulnerable Software and Affected Versions:** ingress-nginx versions 1.11.5 and earlier, and versions from 1.12.0-beta.0 through 1.12.1.

**Description:**

A critical remote code execution (RCE) vulnerability, dubbed "IngressNightmare" (CVE-2025-1974), exists in the ingress-nginx controller for Kubernetes. This vulnerability allows an unauthenticated attacker with access to the pod network to execute arbitrary code in the context of the controller, potentially leading to full cluster compromise and exposure of sensitive secrets. The vulnerability stems from improper isolation and allows attackers to exploit the Admission Controller. A proof-of-concept (PoC) exploit is publicly available. This vulnerability affects over 40% of Kubernetes clusters.

**Recommendations:**

* Upgrade to ingress-nginx version 1.12.1 or later.

* Restrict network access to the Admission Controller.

* Implement network segmentation and strong authentication.

* Regularly audit and patch systems.

* Remove any server-snippet annotations from your ingress configurations.

Exploit

Fix

RCE

Weakness Enumeration

Related Identifiers

BDU:2025-03219
BDU:2025-03220
BIT-NGINX-INGRESS-CONTROLLER-2025-1974
CVE-2025-1974
GHSA-MGVX-RPFC-9MPV
GO-2025-3567
KUBERNETESINGRESSNGINX_CVE2025_1974
OPENSUSE-SU-2025:14937-1
OPENSUSE-SU-2025:14941-1
OPENSUSE-SU-2025:14942-1
OPENSUSE-SU-2025:14943-1
OPENSUSE-SU-2025:14944-1

Affected Products

Kubernetes
Red Os
Ingress-Nginx