Cyber Posture

CVE-2025-1098

HighPublic PoC

Published: 25 March 2025

Published
25 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.3600 97.1th percentile
Risk Priority 39 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-1098 is a vulnerability in the ingress-nginx controller for Kubernetes, hosted at https://github.com/kubernetes/ingress-nginx. The issue stems from the `mirror-target` and `mirror-host` Ingress annotations, which can be abused to inject arbitrary configuration into the underlying nginx process. This flaw enables arbitrary code execution in the context of the ingress-nginx controller and disclosure of Secrets accessible to it. In default installations, the controller has cluster-wide access to all Secrets.

The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating network accessibility, low attack complexity, and a requirement for low privileges such as the ability to create or modify Ingress resources. Exploitation requires no user interaction and maintains an unchanged scope. A successful attack allows an attacker to execute arbitrary code as the ingress-nginx controller process, potentially compromising the host, and to disclose sensitive Secrets across the Kubernetes cluster.

Advisories and related resources include a Kubernetes GitHub issue at https://github.com/kubernetes/kubernetes/issues/131008, a NetApp security advisory at https://security.netapp.com/advisory/ntap-20250328-0008/, and a proof-of-concept exploit published at https://www.exploit-db.com/exploits/52475. These references provide further details on the issue, associated products, and potential mitigations such as updating to patched versions of ingress-nginx.

A public proof-of-concept exploit underscores the vulnerability's practicality, highlighting the need for immediate patching in Kubernetes environments using ingress-nginx. The flaw is linked to CWE-20 (Improper Input Validation) and was published on 2025-03-25.

Details

CWE(s)
CWE-20

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Vulnerability enables exploitation of public-facing ingress-nginx for RCE (Unix shell) and privilege escalation from low-priv Ingress modification to controller code exec with secret access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References