Tech »  Topic »  PoC Exploit Released for Ingress-NGINX RCE Vulnerabilities

PoC Exploit Released for Ingress-NGINX RCE Vulnerabilities


A recently disclosed vulnerability in Ingress-NGINX, tracked as CVE-2025-1974, has raised concerns about the security of Kubernetes environments.

This vulnerability allows for Remote Code Execution (RCE) through the validating webhook server integrated into Ingress-NGINX. A Proof of Concept (PoC) exploit has been released, demonstrating how attackers could exploit this flaw.

CVE-2025-1974 affects versions of Ingress-NGINX where the validating webhook is enabled. The webhook listens on port 8443 and is designed to validate configurations before applying them to NGINX instances.

However, due to a security oversight, an attacker can craft malicious AdmissionRequests containing NGINX configurations that lead to RCE.

PoC Exploit

The PoC exploit has been tested in a local Minikube environment. Here’s a step-by-step guide on how it works:

  1. Create a Vulnerable Pod:
    Users start by applying the relevant NGINX Ingress controller configuration using Kubernetes:
kubectl apply -f nginx-ingress-controller.yaml
  1. Identify the Webhook Server:
    Describing the pod reveals details ...

Copyright of this story solely belongs to gbhackers . To see the full text click HERE