CVE-2025-24514: ingress-nginx controller - configuration injection via unsanitized auth-url annotation
A security issue was discovered in ingress-nginx where the auth-url
Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
References
- github.com/advisories/GHSA-fwwp-xcxw-39vq
- github.com/kubernetes/ingress-nginx
- github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.11.5
- github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.12.1
- github.com/kubernetes/kubernetes/issues/131006
- groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ
- nvd.nist.gov/vuln/detail/CVE-2025-24514
Code Behaviors & Features
Detect and mitigate CVE-2025-24514 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →