CVE-2025-14727
Improper Validation in NGINX Ingress Controller Rewrite Annotation
Publication date: 2025-12-17
Last updated on: 2025-12-17
Assigner: F5 Networks
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nginx | ingress_controller | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the NGINX Ingress Controller's nginx.org/rewrite-target annotation validation, which means there is an issue with how the controller validates the rewrite-target annotation, potentially allowing unintended behavior.
How can this vulnerability impact me? :
The vulnerability has a high severity score (CVSS v3.1 BaseScore=8.3) indicating it can lead to high impact on confidentiality, integrity, and a low impact on availability. This suggests that exploitation could allow attackers to compromise data confidentiality and integrity, possibly leading to unauthorized access or modification of data.