Tracked as CVE-2026-24512, the flaw allows remote attackers to execute arbitrary code and potentially compromise entire Kubernetes clusters by exploiting the ingress component used for managing inbound traffic.
Researchers discovered that improper validation within the rules.http.paths.path field allows malicious users to inject rogue configuration directives into nginx.
These injected rules can manipulate how requests are processed, enabling code execution within the ingress-nginx controller container.
Since the controller often has broad access to Kubernetes secrets, an attacker could leverage this to extract sensitive data or modify workloads.
At a CVSS v3.1 score of 8.8 (High), CVE-2026-24512 poses an immediate threat to clusters that rely on vulnerable ingress-nginx deployments.
Successful exploitation could lead to full cluster compromise, service disruption, or persistent access by threat actors.
Ingress-nginx is a widely used, open-source ingress controller for Kubernetes, acting as a gateway between external clients and cluster services.
Due to its pervasiveness, the discovery of CVE-2026-24512 has a broad operational impact. The root cause lies in improper input sanitization within the Ingress resource configuration, specifically, how the path field handles user-defined data.
Attackers can craft specially formatted inputs that allow nginx directives to be unintentionally injected and executed at runtime.
A key concern is that default ingress-nginx installations are often configured with access to all Kubernetes secrets.
If exploited, this vulnerability could allow attackers to exfiltrate credentials, reconfigure cluster roles, or deploy malicious containers with elevated privileges.
Below is a technical summary of the flaw:
| Attribute | Value |
|---|---|
| CVE ID | CVE-2026-24512 |
| CVSS Score | 8.8 (High) |
The Kubernetes Security Response Committee has released patched versions addressing the bug in v1.13.7 and v1.14.3. Administrators should upgrade immediately using the official ingress-nginx documentation.
To assess cluster exposure, admins can identify active ingress-nginx deployments by running:
textkubectl get pods --all-namespaces --selector app.kubernetes.io/name=ingress-nginx
Clusters running affected builds should be patched without delay. Additionally, reviewing existing Ingress objects for suspicious path fields, particularly those containing escape sequences or directive-like syntax, can help detect ongoing exploitation attempts.
Security monitoring should focus on anomalies in nginx log patterns or unauthorized access to Kubernetes secrets. Network-level intrusion detection can also spot malicious traffic generated by exploitation attempts.
Importantly, the Kubernetes community has scheduled the ingress-nginx project retirement for March 2026, after which no further patches or updates will be issued.
Given the history of critical vulnerabilities, including 2025’s IngressNightmare flaw chain (CVE-2025-1974 and related bugs), organizations are strongly urged to plan migrations to alternative ingress controllers such as Contour, Traefik, or HAProxy.
Immediate patching and future migration planning are vital to maintaining cluster integrity and securing production Kubernetes environments against remote compromise.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Ingress-NGINX Vulnerability Allows Attackers to Execute Arbitrary Code appeared first on Cyber Security News.
Today's links Ada Palmer's "Inventing the Renaissance": A tour-de-force, a magnum opus, a work of…
Future The People Do Not Yearn for AutomationNilay Patel | The Verge “Not everything about…
The global energy industry has long depended on seismic data to locate oil and gas…
Artificial intelligence is quietly transforming every corner of modern industry. From predictive maintenance in heavy…
Additive manufacturing has always lived in a bit of a gray area. Some see it…
The global energy industry has long depended on seismic data to locate oil and gas…
This website uses cookies.