NGINX ngx_http_rewrite_module vulnerability CVE-2026-42945

admin • May 15, 2026
| 9 min read | 32 views views

Security Advisory Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewriteif, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. (CVE-2026-42945)

NGINX

ProductBranchVersions known to be vulnerable1Fixes introduced inSeverity/CVSS score2Vulnerable component or feature
NGINX Plus37.xNone37.0.0High/8.1 (CVSS v3.1)
Critical/9.2 (CVSS v4.0)
The ngx_http_rewrite_module module
RxR32 – R36R36 P4
R32 P6
NGINX Open Source1.x1.0.0 – 1.30.01.31.0
1.30.1
High/8.1 (CVSS v3.1)
Critical/9.2 (CVSS v4.0)
The ngx_http_rewrite_module module
0.x0.6.27 – 0.9.7Will not fix
NGINX Instance Manager2.x2.16.0 – 2.21.1NoneHigh/8.1 (CVSS v3.1)
Critical/9.2 (CVSS v4.0)
Base NGINX Open Source software components
F5 WAF for NGINX5.x5.9.0 – 5.12.1NoneHigh/8.1 (CVSS v3.1)
Critical/9.2 (CVSS v4.0)
Base NGINX Plus software components
NGINX App Protect WAF5.x5.1.0 – 5.8.0NoneHigh/8.1 (CVSS v3.1)
Critical/9.2 (CVSS v4.0)
Base NGINX Plus software components
4.x4.9.0 – 4.16.0None
F5 DoS for NGINX4.x4.8.0NoneHigh/8.1 (CVSS v3.1)
Critical/9.2 (CVSS v4.0)
Base NGINX Plus software components
NGINX App Protect DoS4.x4.3.0 – 4.7.0NoneHigh/8.1 (CVSS v3.1)
Critical/9.2 (CVSS v4.0)
Base NGINX Plus software components
NGINX Gateway Fabric2.x2.0.0 – 2.5.1NoneHigh/8.1 (CVSS v3.1)
Critical/9.2 (CVSS v4.0)
Base NGINX Plus or NGINX Open Source software components
1.x1.3.0 – 1.6.2None
NGINX Ingress Controller5.x5.0.0 – 5.4.1NoneHigh/8.1 (CVSS v3.1)
Critical/9.2 (CVSS v4.0)
Base NGINX Plus or NGINX Open Source software components
4.x4.0.0 – 4.0.1None
3.x3.5.0 – 3.7.2None
NGINX (all other products)AllNoneNot applicableNot vulnerableNone

1F5 evaluates only software versions that have not yet reached the End of Technical Support (EoTS) phase of their lifecycle. For more information, refer to the Security hotfixes section of K4602: Overview of the F5 security vulnerability response policy.

#CVE-2026-42945 #F5 AI Gateway #nginx #privacy #security

admin

Author at The Sharing KH

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *