CVE-2022-4886
Ingress NGINX Controller (community-driven) vulnerability analysis and mitigation

Overview

A security issue was discovered in ingress-nginx (CVE-2022-4886) where users with permissions to create or update ingress objects can bypass the sanitization of the spec.rules[].http.paths[].path field of an Ingress object to obtain the credentials of the ingress-nginx controller. The vulnerability was reported by Ginoah from the DEVCORE Internship Program and was disclosed on October 25, 2023 (Kubernetes Advisory).

Technical details

The vulnerability affects the path sanitization mechanism in ingress-nginx versions prior to v1.8.0. It specifically involves the ability to bypass sanitization controls using the log_format directive in the networking.k8s.io or extensions API group. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (OSS Security).

Impact

In the default configuration, successful exploitation of this vulnerability allows attackers to obtain the credentials of the ingress-nginx controller, which has access to all secrets in the cluster. Multi-tenant environments where non-admin users have permissions to create Ingress objects are most affected by this issue (Kubernetes Advisory).

Mitigation and workarounds

Users can verify if they are affected by running kubectl get po -n ingress-nginx to check if ingress-nginx is installed on their cluster. The vulnerability has been fixed in ingress-nginx version 1.8.0 and later. Users running earlier versions should upgrade to the patched version (Github Issue).

Additional resources


SourceThis report was generated using AI

Related Ingress NGINX Controller (community-driven) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-1974CRITICAL9.8
  • Ingress NGINX Controller (community-driven)Ingress NGINX Controller (community-driven)
  • ingress-nginx-controller-1.11
NoYesMar 25, 2025
CVE-2025-24514HIGH8.8
  • Ingress NGINX Controller (community-driven)Ingress NGINX Controller (community-driven)
  • cpe:2.3:a:kubernetes:ingress-nginx
NoYesMar 25, 2025
CVE-2025-1098HIGH8.8
  • Ingress NGINX Controller (community-driven)Ingress NGINX Controller (community-driven)
  • ingress-nginx-controller-1.10
NoYesMar 25, 2025
CVE-2025-1097HIGH8.8
  • Ingress NGINX Controller (community-driven)Ingress NGINX Controller (community-driven)
  • ingress-nginx-controller-1.10
NoYesMar 25, 2025
CVE-2025-24513MEDIUM4.8
  • Ingress NGINX Controller (community-driven)Ingress NGINX Controller (community-driven)
  • ingress-nginx-controller-1.10
NoYesMar 25, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management