Description
Skipper is an HTTP router and reverse proxy for service composition. Prior to version 0.24.0, when running Skipper as an Ingress controller, users with permissions to create an Ingress and a Service of type ExternalName can create routes that enable them to use Skipper's network access to reach internal services. Version 0.24.0 disables Kubernetes ExternalName by default. As a workaround, developers can allow list targets of an ExternalName and allow list via regular expressions.
Published: 2026-01-26
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to internal services via ExternalName
Action: Patch Immediately
AI Analysis

Impact

The vulnerability allows users with permission to create a Kubernetes Ingress resource and a Service of type ExternalName to configure Skipper’s routing to point to internal services. By doing so, an attacker can use the Ingress controller to reach internal resources that are otherwise unreachable from outside the cluster, potentially exposing sensitive data or enabling lateral movement within the environment. This flaw arises from an authorization bypass (CWE-441) and a server‑side request forgery vulnerability (CWE-918).

Affected Systems

The issue affects Zalando Skipper when deployed as an Ingress controller. All releases prior to 0.24.0 are vulnerable; versions 0.24.0 and later have disabled the ExternalName handling by default.

Risk and Exploitability

The CVSS base score is 8.1, indicating a high severity vulnerability. The EPSS score is below 1 %, suggesting a low probability of exploitation at this time, although the vulnerability is not listed in the CISA KEV catalog. The attack vector requires valid Kubernetes API access to create the specific resources, so the threat is primarily for insiders or compromised nodes that can interact with the API.

Generated by OpenCVE AI on April 18, 2026 at 14:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Skipper to version 0.24.0 or later
  • Configure the cluster to deny creation of ExternalName services or enforce an allow‑ of approved targets
  • Apply a regular‑expression whitelist for ExternalName targets to restrict outbound routing to known internal services

Generated by OpenCVE AI on April 18, 2026 at 14:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mxxc-p822-2hx9 Skipper Ingress Controller Allows Unauthorized Access to Internal Services via ExternalName
History

Wed, 18 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:zalando:skipper:*:*:*:*:*:*:*:*

Tue, 27 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Zalando
Zalando skipper
Vendors & Products Zalando
Zalando skipper

Mon, 26 Jan 2026 22:45:00 +0000

Type Values Removed Values Added
Description Skipper is an HTTP router and reverse proxy for service composition. Prior to version 0.24.0, when running Skipper as an Ingress controller, users with permissions to create an Ingress and a Service of type ExternalName can create routes that enable them to use Skipper's network access to reach internal services. Version 0.24.0 disables Kubernetes ExternalName by default. As a workaround, developers can allow list targets of an ExternalName and allow list via regular expressions.
Title Skipper Ingress Controller Allows Unauthorized Access to Internal Services via ExternalName
Weaknesses CWE-441
CWE-918
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-27T14:51:35.229Z

Reserved: 2026-01-23T00:38:20.546Z

Link: CVE-2026-24470

cve-icon Vulnrichment

Updated: 2026-01-27T14:51:31.267Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T23:16:09.123

Modified: 2026-02-18T17:39:44.020

Link: CVE-2026-24470

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:00:03Z

Weaknesses