BIT-nginx-2026-42945

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/nginx/BIT-nginx-2026-42945.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-nginx-2026-42945
Aliases
Published
2026-05-15T08:50:08.298Z
Modified
2026-05-15T11:11:26.002541179Z
Summary
NGINX ngx_http_rewrite_module vulnerability
Details

NGINX Plus and NGINX Open Source have a vulnerability in the ngxhttprewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Database specific
{
    "severity": "Critical",
    "cpes": [
        "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*"
    ]
}
References

Affected packages

Bitnami / nginx

Package

Name
nginx
Purl
pkg:bitnami/nginx

Severity

  • 9.2 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0.6.27
Fixed
1.30.1

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/nginx/BIT-nginx-2026-42945.json"