A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
{
"versions": [
{
"introduced": "1.2.0"
},
{
"last_affected": "1.6.2"
},
{
"introduced": "1.3.0"
},
{
"fixed": "1.28.2"
},
{
"introduced": "1.29.0"
},
{
"fixed": "1.29.5"
}
]
}{
"versions": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.4.1"
},
{
"introduced": "3.4.0"
},
{
"last_affected": "3.7.2"
},
{
"introduced": "4.0.0"
},
{
"last_affected": "4.0.1"
},
{
"introduced": "5.0.0"
},
{
"fixed": "5.3.3"
}
]
}[
{
"events": [
{
"introduced": "2.15.1"
},
{
"last_affected": "2.21.0"
}
]
},
{
"events": [
{
"introduced": "r33"
},
{
"fixed": "r35"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r32-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r32-p1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r32-p2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r32-p3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r33-p1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r33-p2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r33-p3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r34-p1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r34-p2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r35-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r36-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "r36-p1"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1642.json"