Vulnerability Description
A security issue was discovered in ingress-nginx where the protection afforded by the `auth-url` Ingress annotation may not be effective in the presence of a specific misconfiguration. If the ingress-nginx controller is configured with a default custom-errors configuration that includes HTTP errors 401 or 403, and if the configured default custom-errors backend is defective and fails to respect the X-Code HTTP header, then an Ingress with the `auth-url` annotation may be accessed even when authentication fails. Note that the built-in custom-errors backend works correctly. To trigger this issue requires an administrator to specifically configure ingress-nginx with a broken external component.
CVSS Score
LOW
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-24513?
CVE-2026-24513 is a vulnerability with a CVSS score of 3.1 (LOW). A security issue was discovered in ingress-nginx where the protection afforded by the `auth-url` Ingress annotation may not be effective in the presence of a specific misconfiguration. If the ingress...
How severe is CVE-2026-24513?
CVE-2026-24513 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24513?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.