Kubernetes Ingress privilege escalation is not theory. It’s a chain of missteps that can turn a border router into a root shell. Ingress is meant to route external traffic into cluster services. When misconfigured, it can route power into hands that should not hold it.
The common path starts with overly broad permissions. An Ingress controller with cluster-admin rights is a loaded weapon. Add a weak RBAC policy and the controller can modify Service definitions, ConfigMaps, or Secrets. From there, attackers pivot deeper — replacing routes, injecting malicious pods, or exfiltrating data without triggering alerts.
TLS mismanagement adds another door. If certificates are stored in plain text within the Ingress namespace and that namespace is accessible, the traffic you think is secure becomes a key to the kingdom. Combined with insecure annotations that execute custom Lua or NGINX snippets, privilege boundaries collapse fast.