{"vulnerability": "CVE-2021-25746", "sightings": [{"uuid": "66584b4b-c8fc-487a-8415-a565b19cf4d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-25746", "type": "seen", "source": "https://gist.github.com/JohnPeng47/5146feaf5e65230c9c09b4348ebe205b", "content": "", "creation_timestamp": "2025-04-23T21:32:11.000000Z"}, {"uuid": "edc5d4c4-bdd2-43a6-82c0-fe012f5e9874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-25746", "type": "seen", "source": "https://t.me/cibsecurity/42089", "content": "\u203c CVE-2021-25746 \u203c\n\nA security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use .metadata.annotations in an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-06T07:22:17.000000Z"}]}