CVE-2026-24512
Kubernetes · ingress-nginx
A security issue was discovered in ingress-nginx related to the 'rules' processing logic. This flaw could allow for the bypass of routing restrictions.
Executive summary
The ingress-nginx controller is vulnerable to a high-severity routing bypass flaw that could allow unauthorized traffic to reach protected backend applications.
Vulnerability
The flaw resides in the logic used to evaluate ingress 'rules'. An attacker may be able to exploit this logic to misroute traffic or circumvent access control lists (ACLs) defined in the ingress resources.
Business impact
The ability to bypass ingress rules directly undermines the security architecture of a containerized environment. This could result in the exposure of private APIs and internal data stores to the public internet, carrying a CVSS score of 8.8 due to the high impact on confidentiality and integrity.
Remediation
Immediate Action: Apply the security patches provided by the ingress-nginx project immediately. Ensure the controller is running a version that addresses this specific 'rules' logic flaw.
Proactive Monitoring: Audit ingress resource definitions for overly permissive rules and monitor for traffic reaching backend services that should be restricted.
Compensating Controls: Use an external Cloud WAF or API Gateway in front of the Kubernetes cluster to provide an additional layer of request validation and filtering.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Security teams should treat this ingress-nginx vulnerability as a top priority. Immediate patching is necessary to prevent potential attackers from bypassing the primary entry point to your application infrastructure.