Kubernetes Ingress NGINX Controller Arbitrary Code Execution (CVE-2025-1974)

critical Nessus Plugin ID 233656

Synopsis

The remote Kubernetes Ingress NGINX Controller is affected by an arbitrary code execution vulnerability.

Description

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Solution

Apply updates in accordance with the vendor advisory.

See Also

http://www.nessus.org/u?d57d9736

Plugin Details

Severity: Critical

ID: 233656

File Name: kubernetes_cve-2025-1974.nbin

Version: 1.1

Type: remote

Family: CGI abuses

Published: 4/1/2025

Updated: 4/1/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-1974

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:kubernetes:nginx_ingress_controller

Required KB Items: installed_sw/Ingress NGINX Admission Controller

Exploited by Nessus: true

Patch Publication Date: 3/25/2025

Vulnerability Publication Date: 3/24/2025

Reference Information

CVE: CVE-2025-1974