Incomplete Filtering of Special Elements Affecting github.com/haproxytech/kubernetes-ingress/pkg package, versions <3.1.13


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMHAPROXYTECHKUBERNETESINGRESSPKG-14171932
  • published3 Dec 2025
  • disclosed8 Oct 2025
  • creditUnknown

Introduced: 8 Oct 2025

CVE-2025-59303  (opens in a new tab)
CWE-791  (opens in a new tab)

How to fix?

Upgrade github.com/haproxytech/kubernetes-ingress/pkg to version 3.1.13 or higher.

Overview

Affected versions of this package are vulnerable to Incomplete Filtering of Special Elements in the config-snippets feature flag. An attacker can access sensitive environment variables, including the Kubernetes service account token secret, by injecting arbitrary HAProxy directives.

Note:

This is only exploitable if the attacker has privileges to create or modify Ingress or Service objects in a Kubernetes cluster and the affected product both ships the base HAProxy RPM and runs it in the Kubernetes Ingress Controller. The fixed versions of HAProxy Enterprise Kubernetes Ingress Controller are 3.0.16-ee1, 1.11.13-ee1 and 1.9.15-ee1. Starting with version 3.2 of the HAProxy Kubernetes Ingress Controller, the config-snippets feature will be disabled by default and will become an opt-in capability.

Workaround

This vulnerability can be mitigated by disabling the config-snippets feature before starting the Ingress Controller using the --disable-config-snippets flag.

CVSS Base Scores

version 4.0
version 3.1