Kubernetes Vulnerability (CVE-2026-3288) [PoC]
CVE-2026-3288
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary co...
Overview
A high-severity security vulnerability, tracked as CVE-2026-3288, has been identified in the ingress-nginx controller for Kubernetes. This flaw allows an attacker to inject malicious configuration into the nginx web server through a specific Ingress annotation, potentially compromising the entire cluster.
Vulnerability Details
In simple terms, ingress-nginx acts as a traffic manager for applications running in a Kubernetes cluster. A feature called the nginx.ingress.kubernetes.io/rewrite-target annotation, used for redirecting web traffic, does not properly validate user input. An attacker with permissions to create or modify an Ingress resource can exploit this by crafting a malicious value for this annotation. This malicious input is then processed as part of the nginx configuration file, allowing the attacker to inject arbitrary commands.
Impact and Risks
The impact of successful exploitation is severe. An attacker can achieve arbitrary code execution within the ingress-nginx controller pod. Because this controller typically runs with high privileges, the attacker gains the ability to:
- Access Sensitive Data: Read all Secrets stored in the Kubernetes cluster. In a default installation, the controller has permissions to access any Secret, potentially exposing credentials, API tokens, and certificates cluster-wide.
- Disrupt Operations: Modify or disrupt traffic routing for all applications behind the ingress controller.
- Move Laterally: Use the compromised controller as a foothold to attack other workloads within the cluster.
This vulnerability could be a critical vector for a major data breach. For context on the real-world impact of credential theft, recent incidents are detailed in our breach reports.
Remediation and Mitigation
Immediate action is required to protect your Kubernetes environments.
- Patch or Upgrade: The primary solution is to upgrade the ingress-nginx controller to a patched version. Consult the official ingress-nginx GitHub repository for the specific fixed versions. Update your deployment immediately.
- Restrict Permissions: Apply the principle of least privilege. Review and restrict the RBAC (Role-Based Access Control) permissions associated with the ingress-nginx service account. It should not have
cluster-widegetorlistpermissions for Secrets unless absolutely necessary. - Audit Ingress Resources: Review all existing Ingress resources in your clusters for any unusual or unexpected use of the
rewrite-targetannotation. - Control Ingress Creation: Limit permissions for creating or modifying Ingress resources to only trusted administrators. Use admission controllers like OPA Gatekeeper or Kyverno to validate and reject Ingress manifests containing dangerous annotation patterns.
Stay informed on the latest patches and threats for your infrastructure by following our security news. Proactively managing cluster permissions and applying timely updates are your best defenses against such critical vulnerabilities.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| SnailSploit/CVE-2026-3288 Walkthrough: ingress-nginx Configuration Injection via rewrite-target Annotation | ★ 2 |
| bvabhishek/CVE-2026-3288-lab | ★ 1 |
Showing 2 of 2 known references. Source: nomi-sec/PoC-in-GitHub.
Related Advisories
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve Wo...
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.3, the /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt t...
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bri...
A weakness has been identified in FedML-AI FedML up to 0.8.9. Affected is the function sendMessage of the file grpc_server.py of the component gRPC server. Executing a manipulation can lead to deseria...