exploitdb
WORKING POC
VERIFIED
by Likhith Appalaneni · textremotemultiple
https://www.exploit-db.com/exploits/52338
This exploit leverages a crafted AdmissionRequest to the Ingress-NGINX webhook, injecting a malicious shared object (shell.so) via a raw socket connection. The exploit brute-forces process IDs and file descriptors to trigger code execution through a manipulated annotation in the Ingress resource.
Classification
Working Poc 95%
Target:
Ingress-NGINX v4.11.0 on Kubernetes v1.29.0
No auth needed
Prerequisites:
Network access to the admission controller URL · Ability to upload a malicious shared object to the target · Knowledge of the target's process ID and file descriptor ranges
exploitdb
WORKING POC
by Beatriz Fresno Naumova · textremotemultiple
https://www.exploit-db.com/exploits/52475
This exploit demonstrates a file descriptor injection vulnerability in the Ingress-NGINX Admission Controller, leading to remote code execution by uploading a malicious shared object and brute-forcing file descriptors.
Classification
Working Poc 95%
Target:
Ingress-NGINX Admission Controller v1.10.0 to v1.11.1
No auth needed
Prerequisites:
Access to the admission webhook URL · Ability to upload a malicious shared object to the ingress controller
github
WORKING POC
248 stars
by hakaioffsec · pythonpoc
https://github.com/hakaioffsec/IngressNightmare-PoC
This repository contains a functional exploit for CVE-2025-1974, targeting unauthenticated RCE in Ingress NGINX Controller for Kubernetes. The exploit compiles a malicious shared object, uploads it via a crafted HTTP request with mismatched Content-Length, and brute-forces file descriptors to trigger execution.
Classification
Working Poc 95%
Target:
Ingress NGINX Controller for Kubernetes
No auth needed
Prerequisites:
Python 3.x · GCC compiler · access to target Ingress NGINX Controller · admission webhook URL
nomisec
WORKING POC
92 stars
by Esonhugh · poc
https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps
This repository contains a functional exploit for CVE-2025-1974, targeting Kubernetes ingress-nginx. The exploit leverages a flaw in HTTP request handling to achieve remote code execution by manipulating temporary file caching and admission webhook validation.
Classification
Working Poc 95%
Target:
kubernetes/ingress-nginx
No auth needed
Prerequisites:
Access to ingress-nginx controller · Ability to send crafted HTTP requests
nomisec
WORKING POC
90 stars
by sandumjacob · poc
https://github.com/sandumjacob/IngressNightmare-POCs
This PoC demonstrates a remote code execution (RCE) vulnerability in the Kubernetes Ingress-NGINX controller (CVE-2025-1974) by exploiting the validating webhook server. The exploit involves sending a maliciously crafted AdmissionReview request to the webhook server, which processes the request and executes arbitrary commands via `nginx -t` on a temporary configuration file.
Classification
Working Poc 90%
Target:
Kubernetes Ingress-NGINX Controller v1.11.3
No auth needed
Prerequisites:
Access to the Kubernetes cluster · Ability to send requests to the validating webhook server (port 8443) · Ingress-NGINX controller pod running with vulnerable configuration
nomisec
WORKING POC
53 stars
by yoshino-s · poc
https://github.com/yoshino-s/CVE-2025-1974
This PoC exploits CVE-2025-1974 in Kubernetes ingress-nginx by injecting a malicious shared object (shell.so) via a crafted admission request, leading to remote code execution. The exploit leverages file descriptor manipulation and a reverse shell payload.
Classification
Working Poc 95%
Target:
ingress-nginx-controller (Kubernetes)
No auth needed
Prerequisites:
Access to the admission API endpoint · Ability to send crafted HTTP requests
github
WORKING POC
9 stars
by lufeirider · pythonpoc
https://github.com/lufeirider/IngressNightmare-PoC
This repository contains a functional exploit for CVE-2025-1974, targeting a Kubernetes Ingress vulnerability. The exploit uses a crafted AdmissionReview request to achieve remote code execution (RCE) via a base64-encoded payload.
Classification
Working Poc 95%
Target:
Kubernetes Ingress (specific version not explicitly stated)
Auth required
Prerequisites:
Access to a Kubernetes cluster with Ingress resources · Permissions to send AdmissionReview requests
nomisec
WORKING POC
7 stars
by zwxxb · poc
https://github.com/zwxxb/CVE-2025-1974
This repository contains a functional exploit for CVE-2025-1974, targeting unauthenticated RCE in the Ingress NGINX Controller for Kubernetes. The exploit involves compiling a malicious shared object, uploading it via request handling manipulation, and brute-forcing file descriptors to achieve code execution.
Classification
Working Poc 95%
Target:
Ingress NGINX Controller for Kubernetes
No auth needed
Prerequisites:
Python 3.x · GCC compiler · Python requests module · Access to vulnerable Ingress NGINX Controller
nomisec
WORKING POC
4 stars
by hi-unc1e · poc
https://github.com/hi-unc1e/CVE-2025-1974-poc
This is a functional PoC for CVE-2025-1974, an RCE vulnerability in Ingress NGINX. It exploits the admission webhook to inject a reverse shell via a malicious shared object file compiled from C code.
Classification
Working Poc 95%
Target:
Ingress NGINX (Kubernetes)
No auth needed
Prerequisites:
Access to Kubernetes cluster with vulnerable Ingress NGINX · Network access to admission webhook
nomisec
WORKING POC
1 stars
by I3r1h0n · poc
https://github.com/I3r1h0n/IngressNightterror
This repository contains a proof-of-concept exploit for CVE-2025-1974, targeting a vulnerability in NGINX Ingress for Kubernetes. The exploit leverages improper input sanitization in AdmissionReview requests to inject malicious NGINX configurations, enabling arbitrary shared object loading and potential remote code execution.
Classification
Working Poc 95%
Target:
NGINX Ingress Controller for Kubernetes (v1.9.5 and earlier)
No auth needed
Prerequisites:
Access to the Kubernetes API server · Network connectivity to the target NGINX Ingress pod
nomisec
WORKING POC
1 stars
by chhhd · poc
https://github.com/chhhd/CVE-2025-1974
This repository contains a proof-of-concept exploit for CVE-2025-1974, targeting Kubernetes Ingress-NGINX Admission Controller. The exploit leverages unauthenticated AdmissionReview requests to inject malicious configurations, potentially leading to remote code execution when combined with other vulnerabilities.
Classification
Working Poc 95%
Target:
Kubernetes Ingress-NGINX Admission Controller
No auth needed
Prerequisites:
Access to the Ingress-NGINX Admission Controller endpoint · Compiled shared object file for the target architecture
nomisec
WORKING POC
1 stars
by Rubby2001 · poc
https://github.com/Rubby2001/CVE-2025-1974-go
This exploit targets CVE-2025-1974 in Kubernetes Ingress-Nginx by leveraging a file descriptor injection vulnerability to achieve remote code execution. It embeds a reverse shell payload and uses a slow reader to trigger the vulnerability via admission controller requests.
Classification
Working Poc 95%
Target:
Kubernetes Ingress-Nginx
No auth needed
Prerequisites:
Access to a controlled pod in the Kubernetes cluster · Network connectivity to the ingress-nginx-controller-admission service
nomisec
WORKING POC
1 stars
by rjhaikal · poc
https://github.com/rjhaikal/POC-IngressNightmare-CVE-2025-1974
This PoC exploits CVE-2025-1974 in Ingress-NGINX by injecting a malicious shared object (shell.so) via a crafted admission request, leading to remote code execution. The exploit leverages file descriptor manipulation and a reverse shell payload.
Classification
Working Poc 95%
Target:
Ingress-NGINX (Kubernetes)
No auth needed
Prerequisites:
Access to the admission API endpoint · Ability to send HTTP requests to the target
nomisec
WORKING POC
1 stars
by dttuss · poc
https://github.com/dttuss/IngressNightmare-RCE-POC
This PoC exploits CVE-2025-1974 in Ingress-NGINX by injecting a malicious Lua snippet via an Ingress annotation, leading to arbitrary command execution inside the ingress controller pod. The exploit creates or updates an Ingress resource with a server-snippet annotation containing a Lua block that executes a shell command.
Classification
Working Poc 95%
Target:
Ingress-NGINX controller prior to v1.12.1 / v1.11.5
No auth needed
Prerequisites:
Access to Kubernetes API server · Ability to create or update Ingress resources · Ingress-NGINX controller with admission control enabled
nomisec
WRITEUP
by zsxen · poc
https://github.com/zsxen/CVE-2025-1974
This repository is an educational lab for CVE-2025-1974, focusing on attack emulation and defense validation for Windows 11 environments. It includes sanitized fixtures and simulators to demonstrate attack paths without actual exploitation, along with defensive checks for ingress-nginx versions and mitigation posture.
Classification
Writeup 95%
Target:
ingress-nginx (versions < 1.11.0, 1.11.0-1.11.4, 1.12.0)
No auth needed
Prerequisites:
Windows 11 host · PowerShell 7+ · Python 3.11 · Docker Desktop · kubectl · kind
nomisec
WORKING POC
by BoianEduard · poc
https://github.com/BoianEduard/CVE-2025-1974
This repository contains a functional PoC for CVE-2025-1974, an unauthenticated RCE vulnerability in Kubernetes ingress-nginx admission controller. The exploit involves uploading a malicious .so file and injecting it via a crafted Ingress manifest to achieve arbitrary code execution.
Classification
Working Poc 95%
Target:
Kubernetes ingress-nginx admission controller < v1.11.5, v1.11.0-v1.11.4, v1.12.0
No auth needed
Prerequisites:
Access to the Kubernetes cluster network · Ability to send HTTP requests to the ingress-nginx admission webhook
nomisec
WORKING POC
by gunyakit · poc
https://github.com/gunyakit/CVE-2025-1974-PoC-exploit
This exploit leverages CVE-2025-1974 to achieve remote code execution (RCE) in Kubernetes Ingress-nginx by injecting Lua code via a malicious AdmissionReview request. The PoC demonstrates command execution by embedding a Lua payload in an Ingress resource annotation.
Classification
Working Poc 95%
Target:
Kubernetes Ingress-nginx (version not specified)
No auth needed
Prerequisites:
Access to the Kubernetes admission webhook endpoint · Ingress-nginx with vulnerable configuration
nomisec
WRITEUP
by iteride · poc
https://github.com/iteride/CVE-2025-1974
This is a detailed writeup for CVE-2025-1974, an unauthenticated RCE vulnerability in ingress-nginx's validating admission controller. It explains the root cause, impact, affected versions, and exploitation conditions but does not contain actual exploit code.
Classification
Writeup 100%
Target:
ingress-nginx (Kubernetes validating admission controller)
No auth needed
Prerequisites:
Access to pod network or ability to deliver AdmissionReview to validating webhook · Vulnerable version of ingress-nginx · Lack of NetworkPolicy or admission webhook authentication
nomisec
WORKING POC
by BiiTts · poc
https://github.com/BiiTts/POC-IngressNightmare-CVE-2025-1974
This PoC exploits CVE-2025-1974 by injecting a malicious shared library (`shell.so`) into an ingress pod via a crafted HTTP request, then brute-forcing file descriptors to trigger execution. The payload establishes a reverse shell to a hardcoded IP/port.
Classification
Working Poc 95%
Target:
Unknown (likely a Kubernetes ingress controller or similar)
No auth needed
Prerequisites:
Network access to the target ingress URL · Admission webhook URL accessible · Ability to send crafted HTTP requests
github
WORKING POC
by accuknox · pythonpoc
https://github.com/accuknox/CVE-PoC-Collection/tree/main/CVE-2025-1974
The repository contains a functional exploit for CVE-2025-1974, demonstrating a remote code execution (RCE) vulnerability in CUPS via a malicious IPP server and UDP packet injection. The exploit leverages a crafted printer URI and FoomaticRIP command injection to achieve arbitrary command execution on the target system.
Classification
Working Poc 95%
Target:
CUPS (Common Unix Printing System) 2.0.1
No auth needed
Prerequisites:
Network access to the target CUPS server · CUPS browsed service enabled on the target
nomisec
WORKING POC
by Rickerd12 · poc
https://github.com/Rickerd12/exploit-cve-2025-1974
This PoC exploits CVE-2025-1974 in ingress-nginx-controller by injecting a malicious shared object (shell.so) via an admission request, leading to remote code execution. The exploit leverages file descriptor manipulation and a reverse shell payload.
Classification
Working Poc 95%
Target:
ingress-nginx-controller (Kubernetes)
No auth needed
Prerequisites:
Access to admission webhook URL · Ability to send HTTP requests to the target
nomisec
SCANNER
by abrewer251 · poc
https://github.com/abrewer251/CVE-2025-1974_IngressNightmare_PoC
The repository contains a Python script designed to automate sending JSON payloads to a list of IPs via curl, capturing responses, and generating XML reports for successful and failed requests. It does not contain an exploit payload but serves as a scanner to identify potentially vulnerable targets.
Classification
Scanner 90%
Target:
Unknown (scanner for CVE-2025-1974)
No auth needed
Prerequisites:
Python 3.6+ · curl installed · list of target IPs
nomisec
WORKING POC
by salt318 · poc
https://github.com/salt318/CVE-2025-1974
This PoC exploits an authentication bypass in the Ingress-NGINX Admission Controller (CVE-2025-1974) to inject malicious Ingress configurations, potentially leading to RCE when combined with other vulnerabilities. It includes a brute-force component to target /proc file descriptors and a payload delivery mechanism via a shared library.
Classification
Working Poc 90%
Target:
Ingress-NGINX Admission Controller (Kubernetes)
No auth needed
Prerequisites:
Access to the Admission Controller endpoint · Compiled shared library (shell.so) for payload delivery
nomisec
WORKING POC
by zulloper · poc
https://github.com/zulloper/CVE-2025-1974
This PoC exploits CVE-2025-1974 in Kubernetes Ingress Nginx Controller by uploading a malicious shared object (rev_shell.so) and triggering its execution via an AdmissionReview request. The exploit achieves remote code execution by leveraging a vulnerability in the controller's handling of annotations.
Classification
Working Poc 95%
Target:
Kubernetes Ingress Nginx Controller 1.11.3
No auth needed
Prerequisites:
Access to the Kubernetes cluster's ingress controller · Ability to send HTTP requests to the controller · Cross-compiled shared object for the target architecture
nomisec
SCANNER
by tuladhar · poc
https://github.com/tuladhar/ingress-nightmare
This repository contains a Python script that scans a Kubernetes cluster to detect the presence of the Ingress NGINX Controller and checks if it is running a version vulnerable to CVE-2025-1974. It does not exploit the vulnerability but provides version detection and vulnerability status.
Classification
Scanner 100%
Target:
Ingress NGINX Controller (versions < 1.11.0, 1.11.0-1.11.4, 1.12.0)
Auth required
Prerequisites:
Access to a Kubernetes cluster with appropriate permissions to list pods and services
nomisec
WORKING POC
by 0xBingo · poc
https://github.com/0xBingo/CVE-2025-1974
This PoC tests for annotation injection in Kubernetes NGINX Ingress Controller (CVE-2025-1974) by sending a crafted AdmissionReview payload to the admission controller's validation endpoint. It checks if malicious annotations are improperly processed, potentially leading to RCE when chained with other misconfigurations.
Classification
Working Poc 95%
Target:
Kubernetes NGINX Ingress Controller
No auth needed
Prerequisites:
Access to Kubernetes cluster with NGINX Ingress Controller · Ability to send requests to the admission controller endpoint
nomisec
WORKING POC
by m-q-t · poc
https://github.com/m-q-t/ingressnightmare-detection-poc
This PoC detects CVE-2025-1974 by injecting an NGINX configuration directive via the `auth-url` annotation, triggering DNS resolution to an attacker-controlled domain during configuration validation. It does not execute arbitrary code but confirms vulnerability presence through DNS callbacks.
Classification
Working Poc 95%
Target:
Ingress NGINX Controller
No auth needed
Prerequisites:
Access to the admission controller endpoint · DNS callback listener
nomisec
STUB
by yanmarques · poc
https://github.com/yanmarques/CVE-2025-1974
The repository contains only a README.md file with a CVE identifier and no additional details or exploit code. No technical information or proof-of-concept is provided.
Target:
unknown
No auth needed