CVE-2026-1642

Source
https://cve.org/CVERecord?id=CVE-2026-1642
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1642.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-1642
Aliases
Downstream
Related
Published
2026-02-04T15:16:14.190Z
Modified
2026-02-15T00:49:33.777976Z
Severity
  • 8.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

References

Affected packages

Git / github.com/nginx/nginx

Affected versions

release-1.*
release-1.11.0
release-1.11.1
release-1.11.10
release-1.11.11
release-1.11.12
release-1.11.13
release-1.11.2
release-1.11.3
release-1.11.4
release-1.11.5
release-1.11.6
release-1.11.7
release-1.11.8
release-1.11.9
release-1.13.0
release-1.13.1
release-1.13.10
release-1.13.11
release-1.13.12
release-1.13.2
release-1.13.3
release-1.13.4
release-1.13.5
release-1.13.6
release-1.13.7
release-1.13.8
release-1.13.9
release-1.15.0
release-1.15.1
release-1.15.10
release-1.15.11
release-1.15.12
release-1.15.2
release-1.15.3
release-1.15.4
release-1.15.5
release-1.15.6
release-1.15.7
release-1.15.8
release-1.15.9
release-1.17.0
release-1.17.1
release-1.17.10
release-1.17.2
release-1.17.3
release-1.17.4
release-1.17.5
release-1.17.6
release-1.17.7
release-1.17.8
release-1.17.9
release-1.19.0
release-1.19.1
release-1.19.10
release-1.19.2
release-1.19.3
release-1.19.4
release-1.19.5
release-1.19.6
release-1.19.7
release-1.19.8
release-1.19.9
release-1.21.0
release-1.21.1
release-1.21.2
release-1.21.3
release-1.21.4
release-1.21.5
release-1.21.6
release-1.23.0
release-1.23.1
release-1.23.2
release-1.23.3
release-1.23.4
release-1.25.0
release-1.25.1
release-1.25.2
release-1.25.3
release-1.25.4
release-1.25.5
release-1.27.0
release-1.27.1
release-1.27.2
release-1.27.3
release-1.27.4
release-1.27.5
release-1.28.0
release-1.28.1
release-1.29.0
release-1.29.1
release-1.29.2
release-1.29.3
release-1.29.4
release-1.3.0
release-1.3.1
release-1.3.10
release-1.3.11
release-1.3.12
release-1.3.13
release-1.3.14
release-1.3.15
release-1.3.16
release-1.3.2
release-1.3.3
release-1.3.4
release-1.3.5
release-1.3.6
release-1.3.7
release-1.3.8
release-1.3.9
release-1.4.0
release-1.5.0
release-1.5.1
release-1.5.10
release-1.5.11
release-1.5.12
release-1.5.13
release-1.5.2
release-1.5.3
release-1.5.4
release-1.5.5
release-1.5.6
release-1.5.7
release-1.5.8
release-1.5.9
release-1.7.0
release-1.7.1
release-1.7.10
release-1.7.11
release-1.7.12
release-1.7.2
release-1.7.3
release-1.7.4
release-1.7.5
release-1.7.6
release-1.7.7
release-1.7.8
release-1.7.9
release-1.9.0
release-1.9.1
release-1.9.10
release-1.9.11
release-1.9.12
release-1.9.13
release-1.9.14
release-1.9.15
release-1.9.2
release-1.9.3
release-1.9.4
release-1.9.5
release-1.9.6
release-1.9.7
release-1.9.8
release-1.9.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1642.json"

Git / github.com/nginxinc/kubernetes-ingress

Affected ranges

Affected versions

v2.*
v2.0.0
v2.0.1
v2.0.2
v2.0.3
v2.1.0
v2.1.1
v2.1.2
v2.2.0
v2.2.1
v2.2.2
v2.3.0
v2.3.1
v2.4.0
v3.*
v3.0.0
v3.1.0
v3.2.0
v3.3.0
v5.*
v5.3.0
v5.3.1
v5.3.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1642.json"