2026-02-03
Critical ingress-nginx security updates applied
Security Updates Applied
We have proactively updated ingress-nginx to the latest patched versions across all clusters to address four security vulnerabilities disclosed by the Kubernetes project. These updates have already been deployed, and no action is required from your side.
Vulnerabilities Addressed
Critical Severity
CVE-2026-1580 (CVSS 9.1): Configuration injection via auth-method annotation
- Allowed arbitrary nginx configuration injection through the
nginx.ingress.kubernetes.io/auth-methodannotation - Could enable code execution and unauthorized access to cluster secrets
CVE-2026-24512 (CVSS 9.1): Configuration injection via rules.http.paths.path field
- Allowed arbitrary nginx configuration injection through Ingress path specifications
- Could enable remote code execution and exposure of Kubernetes Secrets
High Severity
CVE-2026-24514 (CVSS 7.1): Admission controller denial of service
- Oversized requests to the validating admission controller could cause excessive memory consumption
- Could result in controller pod crashes or node resource exhaustion
Medium/Low Severity
CVE-2026-24513: Auth-URL protection bypass
- Under specific misconfiguration scenarios, authentication protections could be bypassed
- Required specific conditions: custom error configuration and a defective custom-errors backend
What We Did
All clusters have been upgraded to ingress-nginx v1.14.3 (or v1.13.7 for older branches), which contains patches for all four vulnerabilities. The updates were applied with zero downtime to your applications.
Affected Versions
These vulnerabilities affected all ingress-nginx versions prior to v1.13.7 and v1.14.3.
Additional Resources
For detailed technical information about each vulnerability:
- CVE-2026-1580 - auth-method configuration injection
- CVE-2026-24512 - path field configuration injection
- CVE-2026-24513 - auth-url protection bypass
- CVE-2026-24514 - admission controller DoS
If you have any questions or concerns about these updates, please don’t hesitate to reach out to our support team.