CVE-2025-1974
ingress-nginx admission controller RCE escalation
Description
A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
INFO
Published Date :
March 25, 2025, 12:15 a.m.
Last Modified :
Nov. 10, 2025, 6:16 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | [email protected] |
Solution
- Update the ingress-nginx controller to the latest secure version.
- Restrict network access to the ingress-nginx controller.
- Review and limit controller access to sensitive Secrets.
Public PoC/Exploit Available at Github
CVE-2025-1974 has a 66 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-1974.
| URL | Resource |
|---|---|
| https://https://github.com/kubernetes/kubernetes/issues/131009 | |
| https://github.com/B1ack4sh/Blackash-CVE-2025-1974 | |
| https://security.netapp.com/advisory/ntap-20250328-0008/ |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-1974 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-1974
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
My view on IngressNightmare vulnerability
Python Makefile C Shell
None
small toolkit written by AI, for fast security checks in your k8s cluster
Python Shell
None
Python C Shell
None
Python PowerShell Shell Batchfile JavaScript
An unfinished experiment merging vulnerability reports produced by trivy and grype
Makefile Go
None
None
None
C Java Kotlin Python Ruby TypeScript HCL Dockerfile Shell
备份的漏洞库,3月开始我们来维护
None
CVE-2025-1974
Makefile C Go
None
None
Python C
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-1974 vulnerability anywhere in the article.
-
Daily CyberSecurity
Critical Flaw in Wix’s New AI Platform Base44 Allowed Unauthorized Access to Private Enterprise Apps
Image: Wiz Research In a significant finding that highlights the risks associated with emerging AI development platforms, Wiz Research has uncovered a critical vulnerability in Base44, a popular vibe ... Read more
-
CrowdStrike.com
Kubernetes IngressNightmare Vulnerabilities: What You Need to Know
We would like to recognize Amit Serper, Travis Lowe, Tony Gore, Adrian Godoy, Mihai Vasilescu, Suraj Sahu, Pablo Ramos, Raj Jammalamadaka, Lacie Griffin, and Josh Grunzweig for their contributions in ... Read more
-
Cyber Security News
“IngressNightmare” Critical RCE Vulnerabilities in Kubernetes NGINX Clusters Let Attackers Gain Full Control
A recently discovered set of vulnerabilities, dubbed “IngressNightmare,” found in Ingress NGINX Controller, exposing clusters to unauthenticated remote code execution (RCE). Kubernetes dominates conta ... Read more
-
SentinelOne
IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINX
As more organizations adopt containerization, Kubernetes adoption is at an all-time high. A key component to any Kubernetes cluster is allowing and managing external traffic to the services organizati ... Read more
-
Daily CyberSecurity
KNIME Business Hub Hit by Critical Bugs, Including Hard-Coded Password and XSS Flaws
A recent security advisory from KNIME details several vulnerabilities affecting the KNIME Business Hub, a customer-managed KNIME Hub instance that provides access to Hub resources and allows for custo ... Read more
-
The Hacker News
⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More
Threat Intelligence / Cybersecurity Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the p ... Read more
-
Cyber Security News
PoC Exploit Released for Ingress-NGINX Remote Code Execution Vulnerabilities
A proof-of-concept (PoC) exploit for a critical remote code execution vulnerability in Kubernetes Ingress-NGINX controllers, tracked as CVE-2025-1974. The vulnerability uncovered by WiZ affects the va ... Read more
-
The Cyber Express
Multiple CVEs Found in Ingress-NGINX—Patch Now to Prevent Cluster Compromise
A set of vulnerabilities have been identified in Ingress-NGINX Controller for Kubernetes, posing a risk to organizations relying on the affected versions. These vulnerabilities impact versions prior t ... Read more
-
Cyber Security News
CodeQLEAKED – GitHub Supply Chain Attack Allows Code Execution Using CodeQL Repositories
A significant vulnerability in GitHub’s CodeQL actions could have permitted attackers to execute malicious code across hundreds of thousands of repositories. The vulnerability, assigned CVE-2025-24362 ... Read more
-
Cybersecurity News
Researcher Drops PoC for 9.8 CVSS Ingress-NGINX CVE-2025-1974 Flaw in Kubernetes
A series of critical security vulnerabilities has been discovered in the Ingress-NGINX Controller for Kubernetes, posing a significant risk to Kubernetes deployments. Security researcher Jacob Sandum ... Read more
The following table lists the changes that have been made to the
CVE-2025-1974 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 10, 2025
Action Type Old Value New Value Added Reference https://github.com/B1ack4sh/Blackash-CVE-2025-1974 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 03, 2025
Action Type Old Value New Value Added Reference https://security.netapp.com/advisory/ntap-20250328-0008/ -
New CVE Received by [email protected]
Mar. 25, 2025
Action Type Old Value New Value Added Description A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-653 Added Reference https://https://github.com/kubernetes/kubernetes/issues/131009