Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.8
Ingress Nginx Configuration Injection Allows Code Execution and Secret Exposure
GHSA-9h3p-52vh-959w
CVE-2026-1580
BIT-nginx-ingress-controller-2026-1580
Summary
A security flaw in Ingress Nginx allows attackers to inject code and access sensitive Secrets in the cluster. This is a concern for any cluster using Ingress Nginx, as it can lead to unauthorized access to sensitive data. Customers should update their Ingress Nginx configuration to prevent this issue.
What to do
- Update k8s.io ingress-nginx to version 1.13.7.
- Update k8s.io ingress-nginx to version 1.14.3.
- Update nginx-ingress-controller to version 1.14.3.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| k8s.io | ingress-nginx | <= 1.13.7 | 1.13.7 |
| k8s.io | ingress-nginx | > 1.14.0 , <= 1.14.3 | 1.14.3 |
| – | nginx-ingress-controller | > 1.14.0 , <= 1.14.3 | 1.14.3 |
Original title
ingress-nginx auth-method nginx configuration injection
Original description
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-method` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
ghsa CVSS3.1
8.8
Vulnerability type
CWE-20
Improper Input Validation
Published: 16 Feb 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026