CVE-2025-1098: ingress-nginx controller - configuration injection via unsanitized mirror annotations
A security issue was discovered in ingress-nginx where the mirror-target
and mirror-host
Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
References
- github.com/advisories/GHSA-vg63-w3p9-jc9m
- github.com/kubernetes/ingress-nginx
- github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5
- github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1
- github.com/kubernetes/kubernetes/issues/131008
- groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ
- nvd.nist.gov/vuln/detail/CVE-2025-1098
Code Behaviors & Features
Detect and mitigate CVE-2025-1098 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →