Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Posted on May 14, 2026 By CWS

Cybersecurity analysts have brought to light a series of vulnerabilities affecting both NGINX Plus and NGINX Open Source, spotlighting a severe issue that went unnoticed for 18 years. Discovered by the security group depthfirst, the flaw is identified as a heap buffer overflow in the ngx_http_rewrite_module (CVE-2026-42945), carrying a CVSS v4 score of 9.2. This flaw, dubbed ‘NGINX Rift,’ permits attackers to potentially execute remote code or induce a denial-of-service (DoS) attack with specially crafted requests.

Exploring the NGINX Rift Vulnerability

The vulnerability arises within the ngx_http_rewrite_module when the rewrite directive is succeeded by another rewrite, if, or set directive, using an unnamed Perl-Compatible Regular Expression (PCRE) capture paired with a replacement string containing a question mark. This particular configuration flaw allows an unauthenticated attacker to exploit the system by sending crafted HTTP requests, potentially causing a heap buffer overflow in the NGINX worker process, which can lead to a restart. On systems where Address Space Layout Randomization (ASLR) is disabled, remote code execution becomes feasible.

The vulnerability was responsibly disclosed on April 21, 2026, leading to its resolution in several versions: NGINX Plus R32 – R36 (fixed in R32 P6 and R36 P4), and NGINX Open Source from 1.0.0 to 1.30.0 (addressed in 1.30.1 and 1.31.0). However, no fixes are planned for versions 0.6.27 to 0.9.7. Other affected products include the NGINX Instance Manager, F5 WAF for NGINX, and NGINX App Protect WAF, among others.

Potential Impact and Exploitation

Depthfirst, in its advisory, noted that the flaw allows remote, unauthenticated attackers to corrupt the heap of an NGINX worker process through a crafted URI, enabling remote code execution. This vulnerability’s severity is underscored by its accessibility without authentication, making it easily exploitable to trigger a heap overflow and execute code remotely within the NGINX worker process. Attackers can simply send a single crafted request to overflow the heap, with no prior access required.

The danger lies in the attackers’ ability to control the overflow, as bytes written past the allocation derive from the attacker’s URI, allowing for precision in the corruption. Repeatedly exploiting this flaw can lead to a crash loop, significantly reducing the availability of services hosted on the affected NGINX instance.

Additional Security Concerns and Recommendations

In addition to the NGINX Rift vulnerability, three other vulnerabilities have been patched in NGINX Plus and NGINX Open Source. These include CVE-2026-42946, an excessive memory allocation issue; CVE-2026-40701, a use-after-free vulnerability; and CVE-2026-42934, an out-of-bounds read vulnerability. Each of these vulnerabilities poses varying levels of risk, from memory disclosure to worker process restarts.

Users are strongly advised to update to the latest versions to mitigate these risks. In situations where immediate updates are not feasible, it is recommended to modify configurations by replacing unnamed captures with named ones in affected rewrite directives.

These proactive measures and updates are crucial in fortifying systems against potential exploits and ensuring the security and stability of web server operations.

The Hacker News Tags:CVE-2026-42945, cyber attack, Cybersecurity, F5 Networks, heap buffer overflow, IT security, NGINX, NGINX Open Source, NGINX Plus, remote code execution, security patch, software update, Vulnerability, web security, web server

Post navigation

Previous Post: Unpatched BitLocker Flaws Expose Windows Systems
Next Post: NGINX Vulnerability Allows Remote Code Execution

Related Posts

Secure Vibe Coding: The Complete New Guide Secure Vibe Coding: The Complete New Guide The Hacker News
Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign The Hacker News
Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware The Hacker News
Automation Is Redefining Pentest Delivery Automation Is Redefining Pentest Delivery The Hacker News
Emerging Cyber Threats and AI Exploit Engines Emerging Cyber Threats and AI Exploit Engines The Hacker News
New ClickFix Campaign Exploits Sites for MIMICRAT Deployment New ClickFix Campaign Exploits Sites for MIMICRAT Deployment The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark