Notice of NGINX Ingress Controller Vulnerabilities (CVE-2026-1580, CVE-2026-24512, CVE-2026-24513, and CVE-2026-24514)
The Kubernetes community recently identified four security vulnerabilities (CVE-2026-1580, CVE-2026-24512, CVE-2026-24513, and CVE-2026-24514) that could potentially allow attackers to run unauthorized code or interrupt services.
- CVE-2026-1580: This high-risk vulnerability was discovered in the NGINX Ingress Controller. The nginx.ingress.kubernetes.io/auth-method annotation in an ingress can be exploited to inject configuration into NGINX. This allows attackers to execute arbitrary code within the context of the NGINX Ingress Controller and potentially disclose any secrets accessible to the controller.
- CVE-2026-24512: This high-risk vulnerability was discovered in the NGINX Ingress Controller. When the rules.http.paths.path field in an ingress is set to ImplementationSpecific, its value may be injected directly into NGINX. This allows attackers to execute arbitrary code within the context of the NGINX Ingress Controller and potentially disclose any secrets accessible to the controller.
- CVE-2026-24513: This vulnerability was discovered in the NGINX Ingress Controller. Under certain incorrect configurations, the auth-url annotation in an ingress can be exploited to inject arbitrary configuration into NGINX. This may result in authentication bypass.
- CVE-2026-24514: This vulnerability was discovered in the NGINX Ingress Controller. NGINX Ingress Controller's validating admission controller does not effectively restrict request size. This insufficient validation can lead to resource exhaustion–based denial-of-service attacks.
Description
|
Type |
CVE-ID |
Severity |
Discovered |
|---|---|---|---|
|
Code execution |
High |
2026-02-02 |
|
|
Code execution |
High |
2026-02-02 |
|
|
Permission bypass |
Low |
2026-02-02 |
|
|
Denial of service |
Medium |
2026-02-02 |
Impact
These vulnerabilities affect the open-source NGINX Ingress Controller of the following versions:
- < v1.13.7
- < v1.14.3
CCE NGINX Ingress Controller of version 5.0.2, 6.0.1, or earlier is affected by these vulnerabilities. For details about the mapping between this add-on and open-source versions, see NGINX Ingress Controller Release History.
Identification Method
- Go to Add-ons and check whether the NGINX Ingress Controller add-on has been installed and its version.
Figure 1 Viewing the installed add-on version
- If the add-on version is 5.0.2, 6.0.1, or earlier, it is affected by these vulnerabilities. Otherwise, the add-on is safe from these vulnerabilities.
Solution
CCE will release a new version of NGINX Ingress Controller to fix these vulnerabilities. Keep an eye out for NGINX Ingress Controller Release History.
The vulnerability fixing involves CCE clusters of versions ranging from v1.29 to v1.34. If your CCE cluster version is earlier than v1.29, upgrade the cluster and then NGINX Ingress Controller. Before the upgrade, you are advised to read NGINX Ingress Controller Upgrade Compatibility.
- Log in to the CCE console.
- Go to the Permissions page, select the target cluster, and click Add Permission in the upper right corner.
- Specify the user or user group, namespace, and permission type to be granted, and click View Details.

- Click Clone.

- Enter the name of the new custom permission.
- Delete the ingress role and click OK.

- Return to the page for adding permissions, set Permission Type to Custom, and select the custom permission created in the previous step.

- Click OK.
Helpful Links
- Release history of the open-source NGINX Ingress Controller v1.13.7: https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.13.7
- Release history of the open-source NGINX Ingress Controller v1.14.3: https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.14.3
- Kubernetes community notices:
https://github.com/kubernetes/kubernetes/issues/136677
https://github.com/kubernetes/kubernetes/issues/136678
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot
