
CVE-2025-24514 – ingress-nginx controller - configuration injection via unsanitized auth-url annotation
https://notcve.org/view.php?id=CVE-2025-24514
24 Mar 2025 — A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) • https://packetstorm.news/files/id/190070 • CWE-20: Improper Input Validation •

CVE-2025-24513 – ingress-nginx controller - auth secret file path traversal vulnerability
https://notcve.org/view.php?id=CVE-2025-24513
24 Mar 2025 — A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where attacker-provided data are included in a filename by the ingress-nginx Admission Controller feature, resulting in directory traversal within the container. This could result in denial of service, or when combined with other vulnerabilities, limited disclosure of Secret objects from the cluster. • https://packetstorm.news/files/id/190070 • CWE-20: Improper Input Validation •

CVE-2025-1098 – ingress-nginx controller - configuration injection via unsanitized mirror annotations
https://notcve.org/view.php?id=CVE-2025-1098
24 Mar 2025 — A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) • https://packetstorm.news/files/id/190070 • CWE-20: Improper Input Validation •

CVE-2025-1097 – ingress-nginx controller - configuration injection via unsanitized auth-tls-match-cn annotation
https://notcve.org/view.php?id=CVE-2025-1097
24 Mar 2025 — A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) • https://packetstorm.news/files/id/190070 • CWE-20: Improper Input Validation •

CVE-2025-1974 – ingress-nginx admission controller RCE escalation
https://notcve.org/view.php?id=CVE-2025-1974
24 Mar 2025 — A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) • https://packetstorm.news/files/id/190070 • CWE-653: Improper Isolation or Compartmentalization •

CVE-2024-7598 – Network restriction bypass via race condition during namespace termination
https://notcve.org/view.php?id=CVE-2024-7598
20 Mar 2025 — A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced. • https://github.com/kubernetes/kubernetes/issues/126587 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2025-1767
https://notcve.org/view.php?id=CVE-2025-1767
13 Mar 2025 — This CVE only affects Kubernetes clusters that utilize the in-tree gitRepo volume to clone git repositories from other pods within the same node. Since the in-tree gitRepo volume feature has been deprecated and will not receive security updates upstream, any cluster still using this feature remains vulnerable. • https://github.com/kubernetes/kubernetes/pull/130786 • CWE-20: Improper Input Validation •

CVE-2024-9042
https://notcve.org/view.php?id=CVE-2024-9042
13 Mar 2025 — This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below. • https://github.com/kubernetes/kubernetes/issues/129654 • CWE-20: Improper Input Validation •

CVE-2025-0426 – k8s.io/kubernetes: kubelet: node denial of service via kubelet checkpoint API
https://notcve.org/view.php?id=CVE-2025-0426
13 Feb 2025 — A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk. A flaw was found in Kubernetes. A large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may fill the Node's disk, potentially leading to a Node denial of service. • https://github.com/kubernetes/kubernetes/issues/130016 • CWE-400: Uncontrolled Resource Consumption •

CVE-2024-10220 – Arbitrary command execution through gitRepo volume
https://notcve.org/view.php?id=CVE-2024-10220
22 Nov 2024 — The Kubernetes kubelet component allows arbitrary command execution via specially crafted gitRepo volumes.This issue affects kubelet: through 1.28.11, from 1.29.0 through 1.29.6, from 1.30.0 through 1.30.2. • https://github.com/mochizuki875/CVE-2024-10220-githooks • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •