Vulnerability Description
Skipper is an HTTP router and reverse proxy for service composition. Prior to version 0.24.0, when running Skipper as an Ingress controller, users with permissions to create an Ingress and a Service of type ExternalName can create routes that enable them to use Skipper's network access to reach internal services. Version 0.24.0 disables Kubernetes ExternalName by default. As a workaround, developers can allow list targets of an ExternalName and allow list via regular expressions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zalando | Skipper | < 0.24.0 |
Related Weaknesses (CWE)
References
- https://github.com/zalando/skipper/commit/a4c87ce029a58eb8e1c2c1f93049194a39cf62Patch
- https://github.com/zalando/skipper/security/advisories/GHSA-mxxc-p822-2hx9Vendor AdvisoryMitigation
- https://kubernetes.io/docs/concepts/services-networking/service/#externalnameProduct
FAQ
What is CVE-2026-24470?
CVE-2026-24470 is a vulnerability with a CVSS score of 8.1 (HIGH). Skipper is an HTTP router and reverse proxy for service composition. Prior to version 0.24.0, when running Skipper as an Ingress controller, users with permissions to create an Ingress and a Service o...
How severe is CVE-2026-24470?
CVE-2026-24470 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24470?
Check the references section above for vendor advisories and patch information. Affected products include: Zalando Skipper.