Kubernetes Ingress NGINX Controller Arbitrary Code Execution

critical Web App Scanning Plugin ID 114691

Synopsis

Kubernetes Ingress NGINX Controller Arbitrary Code Execution

Description

Ingress NGINX Controller for Kubernetes versions before 1.11.5, and 1.12.x before 1.12.1 suffer from a critical remote code execution vulnerability. Successful exploitation allows an unauthenticated attacker with access to the pod network to achieve remote code execution (RCE) in the controller's context, potentially leading to disclosure of all cluster-wide secrets and cluster takeover.

Note that this plugin requires the 'File Upload' assessment option enabled in the scan configuration.

Solution

Do not expose NGINX admission controller and upgrade to version 1.11.5, 1.12.1 or later.

See Also

https://github.com/kubernetes/kubernetes/issues/131009

https://kubernetes.io/blog/2025/03/24/ingress-nginx-cve-2025-1974/

Plugin Details

Severity: Critical

ID: 114691

Type: remote

Published: 4/4/2025

Updated: 4/4/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-1974

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2025-1974

Vulnerability Information

CPE: cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/25/2025

Vulnerability Publication Date: 3/23/2025

Reference Information

CVE: CVE-2025-1974