Affected Platforms: Ingress-NGINX Containers v1.11.0-4, v1.12.0, <v1.11.0
Impacted Users: Any Organization
Impact: Attackers gain control of the vulnerable systems
Severity Level: Critical
On March 24, 2025, researchers from Wiz, Inc. disclosed a critical group of vulnerabilities in the Kubernetes Ingress-NGINX controller, dubbed IngressNightmare. Among the most severe issues is CVE‑2025‑1974, which allows an attacker with only network access to the admission webhook to potentially achieve remote code execution (RCE) in the ingress controller pod. This vulnerability was privately disclosed earlier in March and publicly announced after patches became available. It has a CVSS rating of 9.8, underscoring the severity and urgency of applying the fixes.
This article summarizes how these CVEs work, explains our proof-of-concept demo of the exploit, and outlines mitigations and detection strategies. We’ll also show how Lacework FortiCNAPP and the broader Fortinet Security Fabric provide coverage for these kinds of attacks.
Key Point: In many configurations, the admission webhook is reachable from within the cluster’s network (i.e., from any pod). That means a compromised pod or a foothold within the cluster can exploit these annotation injection flaws without needing Kubernetes API credentials.
Our testing confirmed that this exploit path requires an attacker to reach the Ingress-NGINX admission controller on the cluster network. If you can only access the cluster via kubectl port-forward or other indirect means, some temporary file uploading steps may not work reliably. Hence, in practice, this RCE exploit is often executed from a pod that already has an internal vantage point on the cluster network (for example, a malicious container running due to SSRF, a misconfigured job, or a prior partial compromise).
When chained, these vulnerabilities let an attacker:
We’ve created a short video demonstration that showcases how the exploit works from start to finish, which you can watch here:
Network Note: Our tests confirm that port forwarding doesn’t always replicate the network conditions needed to trigger the file upload mechanism. We recommend running the exploit from a pod already in the cluster’s network if you’re assessing your own environment.
Because this vulnerability chain can yield near-complete cluster compromise, remediation should be a top priority. Key recommendations include:
For a more detailed look at the patch details, see:
Within our test environment, we leveraged Lacework FortiCNAPP components to gain multi-layered visibility into the compromise:
In our demo, alerts were generated when we:
Beyond Lacework FortiCNAPP’s container-aware protections, the broader Fortinet Security Fabric provides additional layers of defense:
For a summary of how Fortinet addresses this specific vulnerability and the associated set of CVEs, see the FortiGuard Threat Signal Report published on April 3rd, 2025.
IngressNightmare (CVE‑2025‑1974 and related flaws) highlights the importance of secure ingress configurations and strict controls on admission webhooks. By exploiting an internal vantage point, attackers can pivot from a low-privileged pod into a full cluster compromise if the ingress controller is left unpatched and overly exposed.
Fortunately, patching and hardening are straightforward:
Continuous visibility and detection go hand in hand with strong prevention. Tools like Lacework FortiCNAPP and the Fortinet Security Fabric add significant layers of protection for both container runtime security and the cloud control plane. Organizations can keep their Kubernetes clusters resilient against emerging threats like IngressNightmare by staying current on vulnerability disclosures and employing a defense-in-depth approach.
Thank you for reading—and be sure to watch the demo video for an in-depth look at this exploit in action. Stay vigilant, and keep your clusters secure!
FortiGuard Labs provides an IPS signature against attacks exploiting the following vulnerability:
CVE-2025-1974: Kubernetes.Ingress.NGINX.Controller.Remote.Code.Execution
If you believe this or any other cybersecurity threat has impacted your organization, please contact our Global FortiGuard Incident Response Team.