Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| kubernetes | ingress-nginx | 0 ~ 1.11.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A security issue was discovered in ingress-nginx https-//github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-1098.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-1974 | 9.8 CRITICAL | ingress-nginx admission controller RCE escalation |
| CVE-2025-24514 | 8.8 HIGH | ingress-nginx controller - configuration injection via unsanitized auth-url annotation |
| CVE-2025-1097 | 8.8 HIGH | ingress-nginx controller - configuration injection via unsanitized auth-tls-match-cn annot |
| CVE-2025-24513 | 4.8 MEDIUM | ingress-nginx controller - auth secret file path traversal vulnerability |
No comments yet