Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAM62SmJRKAr8ScvbmEhqTu--H+3irM2imtcu==w=jktXh=m0Sw@mail.gmail.com>
Date: Thu, 19 Mar 2026 12:45:53 -0500
From: Tabitha Sable <tabitha.c.sable@...il.com>
To: oss-security@...ts.openwall.com
Subject: [kubernetes] CVE-2026-4342: ingress-nginx comment-based nginx
 configuration injection

Hello Kubernetes Community,

A security issue was discovered in ingress-nginx where a combination of
Ingress annotations can be used to inject configuration into nginx. This
can lead to arbitrary code execution in the context of the ingress-nginx
controller, and disclosure of Secrets accessible to the controller. (Note
that in the default installation, the controller can access all Secrets
cluster-wide.)

This issue has been rated **HIGH** ([CVSS calculator](
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H),
score: 8.8), and assigned **CVE-2026-4342**

### Am I vulnerable?

This issue affects ingress-nginx. If you do not have ingress-nginx
installed on your cluster, you are not affected. You can check this by
running `kubectl get pods --all-namespaces --selector
app.kubernetes.io/name=ingress-nginx`.

#### Affected Versions

- ingress-nginx: < v1.13.9
- ingress-nginx: < v1.14.5
- ingress-nginx: < v1.15.1

### How do I mitigate this vulnerability?



#### Fixed Versions

- ingress-nginx: v1.13.9
- ingress-nginx: v1.14.5
- ingress-nginx: v1.15.1

#### How to upgrade?

To upgrade, refer to the documentation: [Upgrading Ingress-nginx](
https://kubernetes.github.io/ingress-nginx/deploy/upgrade/)

### Detection

Suspicious data within the `rules.http.paths.path` field of an Ingress
resource could indicate an attempt to exploit this vulnerability.

If you find evidence that this vulnerability has been exploited, please
contact security@...ernetes.io

See the GitHub issue for more details:
https://github.com/kubernetes/kubernetes/issues/137893

#### Acknowledgements

This vulnerability was reported by wooseokdotkim.

Thank You,

Tabitha Sable on behalf of the Kubernetes Security Response Committee

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.