Impact
A denial of service condition exists in the ingress-nginx validating admission controller, allowing the attacker to send oversized requests that consume memory resources. The vulnerability aligns with CWE-770: Exhaustion of Resource. The impact is direct memory overuse that may lead to the controller pod termination or node out‑of‑memory situations, disrupting service availability for the affected workloads.
Affected Systems
The flaw affects installations of the Kubernetes ingress-nginx controller; specific affected versions are not listed in the advisory, so all deployments using ingress-nginx should be examined for the potential presence of the issue.
Risk and Exploitability
The CVSS score is 6.5, indicating moderate severity. The EPSS probability is less than 1%, suggesting a low likelihood of exploitation at the time of analysis, and the vulnerability is not in the CISA KEV catalog. Likely attack vectors involve an external attacker sending large requests to the API server that triggers the admission controller of ingress-nginx. No additional prerequisites are noted beyond the ability to target the controller.
OpenCVE Enrichment
Github GHSA