CVE-2025-24513:
ingress-nginx controller - auth secret file path traversal vulnerability
4.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
3/25/2025
Updated
3/25/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
k8s.io/ingress-nginx | go | ||
k8s.io/ingress-nginx | go |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path handling in the Admission Controller's secret management. The functions responsible for creating auth secret files and validating secret references would be the primary points where user-controlled input (secret names) are incorporated into file paths without adequate sanitization. The CWE-20 and CWE-22 mapping directly indicates missing input validation for path construction. The pattern matches common path traversal vulnerabilities where user-supplied data is used in file operations without sanitization.