Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| kubernetes | ingress-nginx | 0 ~ 1.11.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A security issue was discovered in ingress-nginx https-//github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-24514.yaml | POC Details |
| 2 | None | https://github.com/KimJuhyeong95/cve-2025-24514 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-1974 | 9.8 CRITICAL | ingress-nginx admission controller RCE escalation |
| CVE-2025-1098 | 8.8 HIGH | ingress-nginx controller - configuration injection via unsanitized mirror annotations |
| CVE-2025-1097 | 8.8 HIGH | ingress-nginx controller - configuration injection via unsanitized auth-tls-match-cn annot |
| CVE-2025-24513 | 4.8 MEDIUM | ingress-nginx controller - auth secret file path traversal vulnerability |
No comments yet