High (8.8)

Kubernetes Vulnerability (CVE-2026-3288) [PoC]

CVE-2026-3288

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary co...

Affected: Nginx Kubernetes

Overview

A high-severity security vulnerability, tracked as CVE-2026-3288, has been identified in the ingress-nginx controller for Kubernetes. This flaw allows an attacker to inject malicious configuration into the nginx web server through a specific Ingress annotation, potentially compromising the entire cluster.

Vulnerability Details

In simple terms, ingress-nginx acts as a traffic manager for applications running in a Kubernetes cluster. A feature called the nginx.ingress.kubernetes.io/rewrite-target annotation, used for redirecting web traffic, does not properly validate user input. An attacker with permissions to create or modify an Ingress resource can exploit this by crafting a malicious value for this annotation. This malicious input is then processed as part of the nginx configuration file, allowing the attacker to inject arbitrary commands.

Impact and Risks

The impact of successful exploitation is severe. An attacker can achieve arbitrary code execution within the ingress-nginx controller pod. Because this controller typically runs with high privileges, the attacker gains the ability to:

  • Access Sensitive Data: Read all Secrets stored in the Kubernetes cluster. In a default installation, the controller has permissions to access any Secret, potentially exposing credentials, API tokens, and certificates cluster-wide.
  • Disrupt Operations: Modify or disrupt traffic routing for all applications behind the ingress controller.
  • Move Laterally: Use the compromised controller as a foothold to attack other workloads within the cluster.

This vulnerability could be a critical vector for a major data breach. For context on the real-world impact of credential theft, recent incidents are detailed in our breach reports.

Remediation and Mitigation

Immediate action is required to protect your Kubernetes environments.

  1. Patch or Upgrade: The primary solution is to upgrade the ingress-nginx controller to a patched version. Consult the official ingress-nginx GitHub repository for the specific fixed versions. Update your deployment immediately.
  2. Restrict Permissions: Apply the principle of least privilege. Review and restrict the RBAC (Role-Based Access Control) permissions associated with the ingress-nginx service account. It should not have cluster-wide get or list permissions for Secrets unless absolutely necessary.
  3. Audit Ingress Resources: Review all existing Ingress resources in your clusters for any unusual or unexpected use of the rewrite-target annotation.
  4. Control Ingress Creation: Limit permissions for creating or modifying Ingress resources to only trusted administrators. Use admission controllers like OPA Gatekeeper or Kyverno to validate and reject Ingress manifests containing dangerous annotation patterns.

Stay informed on the latest patches and threats for your infrastructure by following our security news. Proactively managing cluster permissions and applying timely updates are your best defenses against such critical vulnerabilities.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Public PoC References

Unverified third-party code

These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).

Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.

Repository Stars
SnailSploit/CVE-2026-3288

Walkthrough: ingress-nginx Configuration Injection via rewrite-target Annotation

★ 2
bvabhishek/CVE-2026-3288-lab ★ 1

Showing 2 of 2 known references. Source: nomi-sec/PoC-in-GitHub.

Related Advisories

Other Nginx Vulnerabilities

View all Nginx vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.