  {"id":39515,"date":"2026-02-11T14:37:03","date_gmt":"2026-02-11T19:37:03","guid":{"rendered":"https:\/\/www.yorku.ca\/uit\/?p=39515"},"modified":"2026-02-11T14:43:17","modified_gmt":"2026-02-11T19:43:17","slug":"ingress-nginx-configuration-injection-vulnerability-cve-2026-24512","status":"publish","type":"post","link":"https:\/\/www.yorku.ca\/uit\/2026\/02\/ingress-nginx-configuration-injection-vulnerability-cve-2026-24512\/","title":{"rendered":"Ingress NGINX Configuration Injection Vulnerability (CVE-2026-24512)"},"content":{"rendered":"<div class=\"postie-post\">\n<div>\n<div class=\"WordSection1\">\n<p class=\"MsoNormal\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<div align=\"center\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"725\" style=\"width:544.0pt;background:#E0E0E0;border-collapse:collapse\">\n<tbody>\n<tr>\n<td style=\"border:solid windowtext 1.0pt;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\"><\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"600\" style=\"width:450.0pt;background:white;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td style=\"padding:0cm 0cm 0cm 0cm\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:6.75pt 13.5pt 6.75pt 13.5pt\">\n<p class=\"MsoNormal\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><img loading=\"lazy\" decoding=\"async\" width=\"688\" height=\"100\" style=\"width:7.1666in;height:1.0416in\" id=\"Picture_x0020_2\" src=\"https:\/\/www.yorku.ca\/uit\/wp-content\/uploads\/sites\/805\/2026\/02\/image001-8.png\" alt=\"A picture containing text  Description automatically generated\"><\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\" align=\"center\" style=\"text-align:center;page-break-after:avoid\">  <span style=\"font-family:\"IBM Plex Sans\",sans-serif;mso-fareast-language:EN-US\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p class=\"MsoNormal\" align=\"center\" style=\"margin-bottom:12.0pt;text-align:center;line-height:105%\">  <b><span style=\"font-family:\"IBM Plex Sans\",sans-serif\">Information Security Advisory<\/span><\/b><span class=\"xxxxxxxxnormaltextrun\"><o:p><\/o:p><\/span><\/p>\n<p style=\"background:white\"><span style=\"font-family:\"Calibri\",sans-serif;color:black;background:white\"><br \/>  A recently discovered vulnerability in the Kubernetes ingress-nginx controller (CVE\u20112026\u201124512) allows attackers to execute arbitrary code by exploiting improper sanitization of user\u2011supplied ingress path data.<br \/>  <\/span><b><span style=\"font-family:\"Calibri\",sans-serif;color:black\"><br \/>  Severity level<\/span><\/b><b><span style=\"font-size:11.0pt;font-family:\"Calibri\",sans-serif;color:#242424\">&nbsp;<br \/>  <\/span><\/b><span style=\"font-family:\"Calibri\",sans-serif;color:black\">CVSS Score: 8.8\/high<br \/>  <b><br \/>  Description<\/b>:<br \/>  <span style=\"background:white\">Ingress\u2011NGINX is a widely used open\u2011source Kubernetes ingress controller responsible for managing inbound traffic to cluster services.<\/span><\/span><span style=\"font-size:10.5pt;font-family:\"Segoe UI\",sans-serif;color:black\">  <\/span><span style=\"font-family:\"Calibri\",sans-serif;color:black;background:white\">A vulnerability exists in ingress\u2011nginx where the  <b>rules.http.paths.path<\/b> field fails to properly validate user\u2011defined input.<\/span><span style=\"font-size:10.5pt;font-family:\"Segoe UI\",sans-serif;color:black\">  <\/span><span style=\"font-family:\"Calibri\",sans-serif;color:black;background:white\">This flaw allows attackers to inject rogue NGINX configuration directives, enabling arbitrary code execution within the ingress\u2011nginx controller container.<br \/>  <\/span><b><span style=\"font-family:\"Calibri\",sans-serif;color:black\"><br \/>  Affected Versions<\/span><\/b><b><span style=\"font-size:11.0pt;font-family:\"Calibri\",sans-serif;color:#242424\">:<br \/>  <\/span><\/b><span style=\"font-family:\"Calibri\",sans-serif;color:black;background:white\">All ingress-nginx versions prior to v1.13.7 and prior v1.14.3 are affected.<br \/>  <b><br \/>  Impact:<br \/>  <\/b>Successful exploitation allows attackers to execute arbitrary code inside the ingress-nginx controller.<br \/>  <\/span><b><span style=\"font-family:\"Calibri\",sans-serif;color:black\"><br \/>  Resolution:<br \/>  <\/span><\/b><span style=\"font-family:\"Calibri\",sans-serif;color:black;background:white\">Upgrade to the version 1.13.7, 1.14.3 or later immediately.<br \/>  <\/span><span class=\"MsoHyperlink\"><b><br \/>  <\/b><\/span><span class=\"MsoHyperlink\"><b><span style=\"color:black;text-decoration:none\">Mitigation:<br \/>  <\/span><\/b><\/span><span style=\"font-family:\"Calibri\",sans-serif;color:black;background:white\">Deploy a validating admission controller that rejects Ingress resources using the ImplementationSpecific path type, blocking the attack vector.<br \/>  <\/span><span class=\"MsoHyperlink\"><b><br \/>  <\/b><\/span><span class=\"MsoHyperlink\"><b><span style=\"color:black;background:white;text-decoration:none\">Reference:<\/span><\/b><\/span><span class=\"MsoHyperlink\"><span style=\"font-family:\"Calibri\",sans-serif;color:black;background:white;text-decoration:none\"><o:p><\/o:p><\/span><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span class=\"MsoHyperlink\"><span style=\"color:black;background:white;text-decoration:none\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-24512\"><span style=\"color:black;text-decoration:none\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-24512<\/span><\/a><o:p><\/o:p><\/span><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span class=\"MsoHyperlink\"><span style=\"color:black;background:white;text-decoration:none\"><a href=\"https:\/\/www.runzero.com\/blog\/k8s-ingress-nginx-controller\/\"><span style=\"color:black;text-decoration:none\">https:\/\/www.runzero.com\/blog\/k8s-ingress-nginx-controller\/<\/span><\/a><o:p><\/o:p><\/span><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span class=\"MsoHyperlink\"><span style=\"color:black;background:white;text-decoration:none\"><a href=\"https:\/\/www.tenable.com\/cve\/CVE-2026-24512\"><span style=\"color:black;text-decoration:none\">https:\/\/www.tenable.com\/cve\/CVE-2026-24512<\/span><\/a><o:p><\/o:p><\/span><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span class=\"MsoHyperlink\"><span style=\"color:black;background:white;text-decoration:none\"><a href=\"https:\/\/github.com\/kubernetes\/kubernetes\/issues\/136678\"><span style=\"color:black;text-decoration:none\">https:\/\/github.com\/kubernetes\/kubernetes\/issues\/136678<\/span><\/a><o:p><\/o:p><\/span><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"Calibri\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"Calibri\",sans-serif;color:black;background:white\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p class=\"MsoNormal\"><o:p>&nbsp;<\/o:p><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom:12.0pt;line-height:105%\"><span style=\"font-size:10.0pt;line-height:105%;font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\"><br \/>  Information&nbsp;Security<\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif\">&nbsp;<o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\"><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><\/p>\n<p>  Contact <\/span><\/b><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\" style=\"page-break-after:avoid\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\">IT Client Services at  <\/span><a href=\"mailto:askIT@yorku.ca\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><a href=\"mailto:askIT@yorku.ca\" >askIT@yorku.ca<\/a><\/span><\/a><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"> or 416 736 5800  <span style=\"color:#548235\"><o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:6.75pt 13.5pt 6.75pt 13.5pt\">\n<p class=\"MsoNormal\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<p class=\"MsoNormal\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"600\" style=\"width:450.0pt;background:white;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"600\" style=\"width:450.0pt;background:#F2F2F2;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:6.75pt 13.5pt 6.75pt 13.5pt\">\n<p class=\"MsoNormal\"><a href=\"https:\/\/www.yorku.ca\/about\/privacy-legal\/\" target=\"_blank\"><span lang=\"EN-US\" style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\">PRIVACY POLICY<\/span><\/a><span lang=\"EN-US\" style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\">&nbsp;|&nbsp;<\/span><a href=\"https:\/\/www.yorku.ca\" target=\"_blank\"><span lang=\"EN-US\" style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\">VISIT   WWW.YORKU.CA<\/span><\/a><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif;color:#505050\"><br \/>  This email was sent by: <b>¿ì²¥ÊÓÆµ, 4700 Keele Street, Toronto, Ontario M3J 1P3<\/b>  <\/span><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif;color:#505050\">This email is viewed best in Microsoft Outlook for web&nbsp;<\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p class=\"MsoNormal\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size:11.0pt\"><o:p>&nbsp;<\/o:p><\/span><\/p><\/div>\n<\/p><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Information Security Advisory A recently discovered vulnerability in the Kubernetes ingress-nginx controller (CVE\u20112026\u201124512) allows attackers to execute arbitrary code by exploiting improper sanitization of user\u2011supplied ingress path data. Severity level&nbsp; CVSS Score: 8.8\/high Description: Ingress\u2011NGINX is a widely used open\u2011source Kubernetes ingress controller responsible for managing inbound traffic to cluster services. A vulnerability [&hellip;]<\/p>\n","protected":false},"author":212,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"categories":[29],"tags":[],"class_list":["post-39515","post","type-post","status-publish","format-standard","hentry","category-news"],"taxonomy_info":{"category":[{"value":29,"label":"News"}]},"featured_image_src_large":false,"author_info":{"display_name":"aalaily","author_link":"https:\/\/www.yorku.ca\/uit\/author\/aalaily\/"},"comment_info":"","category_info":[{"term_id":29,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":3,"taxonomy":"category","description":"","parent":0,"count":484,"filter":"raw","cat_ID":29,"category_count":484,"category_description":"","cat_name":"News","category_nicename":"news","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/posts\/39515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/comments?post=39515"}],"version-history":[{"count":0,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/posts\/39515\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/media?parent=39515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/categories?post=39515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/tags?post=39515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}