CVE-2026-4342 – Kubernetes ingress-nginx Controller

CVSS 8.8 IMPORTANT

“A single weak entry point in your cluster can expose everything behind it.”

Kubernetes addressed a high-severity vulnerability in the ingress-nginx controller that could allow attackers to manipulate traffic handling and potentially execute unauthorized actions within the cluster. The issue impacts how incoming requests are processed, creating an opportunity for abuse in exposed environments. CVE-2026-4342 has a CVSS score of 8.8, which is High severity. This level of risk is significant for organizations relying on ingress-nginx as a primary gateway to services.

No verified real-world exploitation or proof-of-concept code has been confirmed. However, given the role of ingress in controlling external access, the vulnerability presents a serious attack surface. The patch strengthens request validation and closes the pathway that could allow malicious traffic to influence cluster behavior.

Key Details

Affected Product
Kubernetes Ingress-nginx
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
CWE Classification
CWE-20
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.