CVE-2025-1098

HIGH NUCLEI

Ingress-Nginx - RCE

Title source: llm

Description

A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Exploits (4)

github WORKING POC 248 stars
by hakaioffsec · pythonpoc
https://github.com/hakaioffsec/IngressNightmare-PoC
github WORKING POC 92 stars
by Esonhugh · gopoc
https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps
github WORKING POC 9 stars
by lufeirider · pythonpoc
https://github.com/lufeirider/IngressNightmare-PoC
exploitdb WORKING POC
by Beatriz Fresno Naumova · textremotemultiple
https://www.exploit-db.com/exploits/52475

Nuclei Templates (1)

Ingress-Nginx Controller - Configuration Injection via Unsanitized Mirror Annotations
HIGHVERIFIEDby UNC1739
Shodan: ssl:"ingress-nginx" port:8443

Scores

CVSS v3 8.8
EPSS 0.4985
EPSS Percentile 97.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-20
Status draft

Affected Products (1)

k8s.io/ingress-nginx < 1.11.5Go

Timeline

Published Mar 25, 2025
Tracked Since Feb 18, 2026