#VU122288 Improper authorization in Ingress-NGINX Controller for Kubernetes - CVE-2026-24513

 

#VU122288 Improper authorization in Ingress-NGINX Controller for Kubernetes - CVE-2026-24513

Published: February 4, 2026


Vulnerability identifier: #VU122288
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-24513
CWE-ID: CWE-285
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Ingress-NGINX Controller for Kubernetes
Software vendor:
Kubernetes

Description

The vulnerability allows a remote user to bypass authorization checks.

The vulnerability exists due to improper authorization checks where the protection afforded by the auth-url Ingress annotation may not be effective in the presence of a specific misconfiguration. If the ingress-nginx controller is configured with a default custom-errors configuration that includes HTTP errors 401 or 403, and if the configured default custom-errors backend is defective and fails to respect the X-Code HTTP header, then an Ingress with the auth-url annotation may be accessed even when authentication fails.


Remediation

Install updates from vendor's website.

External links