PT-2025-12715 · Kubernetes +1 · Ingress-Nginx +2
Nir Ohfeld
+2
·
Published
2025-03-23
·
Updated
2025-08-02
·
CVE-2025-1974
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
## Vulnerability Report
**Name of the Vulnerable Software and Affected Versions:** ingress-nginx versions 1.11.5 and earlier, and versions from 1.12.0-beta.0 through 1.12.1.
**Description:**
A critical remote code execution (RCE) vulnerability, dubbed "IngressNightmare" (CVE-2025-1974), exists in the ingress-nginx controller for Kubernetes. This vulnerability allows an unauthenticated attacker with access to the pod network to execute arbitrary code in the context of the controller, potentially leading to full cluster compromise and exposure of sensitive secrets. The vulnerability stems from improper isolation and allows attackers to exploit the Admission Controller. A proof-of-concept (PoC) exploit is publicly available. This vulnerability affects over 40% of Kubernetes clusters.
**Recommendations:**
* Upgrade to ingress-nginx version 1.12.1 or later.
* Restrict network access to the Admission Controller.
* Implement network segmentation and strong authentication.
* Regularly audit and patch systems.
* Remove any server-snippet annotations from your ingress configurations.
Exploit
Fix
RCE
Related Identifiers
Affected Products
References · 309
- 🔥 https://github.com/sandumjacob/IngressNightmare-POCs⭐ 11 🔗 4 · Exploit
- 🔥 https://github.com/zwxxb/CVE-2025-1974⭐ 2 🔗 3 · Exploit
- https://osv.dev/vulnerability/GHSA-mgvx-rpfc-9mpv · Vendor Advisory
- https://osv.dev/vulnerability/openSUSE-SU-2025:14941-1 · Vendor Advisory
- https://osv.dev/vulnerability/openSUSE-SU-2025:14942-1 · Vendor Advisory
- https://osv.dev/vulnerability/openSUSE-SU-2025:14944-1 · Vendor Advisory
- https://osv.dev/vulnerability/openSUSE-SU-2025:14943-1 · Vendor Advisory
- https://osv.dev/vulnerability/GO-2025-3567 · Vendor Advisory
- https://osv.dev/vulnerability/BIT-nginx-ingress-controller-2025-1974 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-1974 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-24514 · Security Note
- https://osv.dev/vulnerability/openSUSE-SU-2025:14937-1 · Vendor Advisory
- http://repo.red-soft.ru/redos/7.3c/x86_64/updates · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/719083 · Security Note
- https://bdu.fstec.ru/vul/2025-03219 · Security Note