LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-4342 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: March 20, 2026

Ingress-nginx - Remote Code Execution & Information Disclosure

Published: March 19, 2026Updated: March 20, 2026PoC AvailableRemote Exploitable

Overview

Ingress-nginx contains a configuration injection vulnerability caused by a combination of Ingress annotations, letting attackers execute arbitrary code and disclose Secrets in the ingress-nginx controller context, exploit requires crafted Ingress annotations.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 3.8%(Probability of exploitation in next 30 days)

Impact

Attackers can execute arbitrary code and disclose Secrets accessible to the ingress-nginx controller, potentially compromising the entire cluster.

Mitigation

Update to the latest version of ingress-nginx with the fix applied.

Social Media Activity(1 post)

Masto.kukei.eu
Masto.kukei.eu
@mastokukei
Apr 9, 2026

**WebAssembly (WASM) and GPU acceleration** (e.g., SPIR-V tools, compute-in-memory architectures) - **Security vulnerabilities** (e.g., CVE-2026-4342 in ingress-nginx, xz backdoor fallout) - **Retro computing & emulation** (e.g., TI-99/4A, Mac OS X on Wii) [2/2]

View original post

Details

CVE ID
CVE-2026-4342
Severity
High
CVSS Score
8.8
Type
undefined
Status
unconfirmed
EPSS
3.8%
Social Posts
1

CWE

  • CWE-20

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

3.8%Probability of exploitation in the next 30 days