F5 Nginx Plus vulnerabilities

20 known vulnerabilities affecting f5/nginx_plus.

Total CVEs
20
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
HIGH11MEDIUM9

Vulnerabilities

Page 1 of 1
CVE-2026-27651HIGHCVSS 8.7≥ r33, < r35vr32+7 more2026-03-24
CVE-2026-27651 [HIGH] CWE-476 CVE-2026-27651: When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have r
cvelistv5nvd
CVE-2026-27654HIGHCVSS 8.8vr32vr33+8 more2026-03-24
CVE-2026-27654 [HIGH] CWE-122 CVE-2026-27654: NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might a NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX O
cvelistv5nvd
CVE-2026-32647HIGHCVSS 8.5vr32vr33+8 more2026-03-24
CVE-2026-32647 [HIGH] CWE-125 CVE-2026-32647: NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built wit
cvelistv5nvd
CVE-2026-28753MEDIUMCVSS 6.3vr32vr33+8 more2026-03-24
CVE-2026-28753 [MEDIUM] CWE-93 CVE-2026-28753: NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Tec
cvelistv5nvd
CVE-2026-28755MEDIUMCVSS 5.3vr33vr34+6 more2026-03-24
CVE-2026-28755 [MEDIUM] CWE-863 CVE-2026-28755: NGINX Plus and NGINX Open Source have a vulnerability in the ngx_stream_ssl_module module due to the NGINX Plus and NGINX Open Source have a vulnerability in the ngx_stream_ssl_module module due to the improper handling of revoked certificates when configured with the ssl_verify_client on and ssl_ocsp on directives, allowing the TLS handshake to succeed even after an OCSP check identifies the certificate as revoked. Note: Software versions which
cvelistv5nvd
CVE-2026-1642HIGHCVSS 8.2≥ r33, < r35vr32+9 more2026-02-04
CVE-2026-1642 [HIGH] CWE-349 CVE-2026-1642: A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport La A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server. Note:
cvelistv5nvd
CVE-2025-53859MEDIUMCVSS 6.3vr30vr31+8 more2025-08-13
CVE-2025-53859 [MEDIUM] CWE-125 CVE-2025-53859: NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow a NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and
cvelistv5nvd
CVE-2025-23419MEDIUMCVSS 5.3≥ r28, < r32vr32+2 more2025-02-05
CVE-2025-23419 [MEDIUM] CWE-863 CVE-2025-23419: When multiple server blocks are configured to share the same IP address and port, an attacker can us When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers. This vulnerability arises when TLS Session Tickets https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_ticket_key are used and/or the SSL s
cvelistv5nvd
CVE-2024-39792HIGHCVSS 8.7vr30vr31+2 more2024-08-14
CVE-2024-39792 [HIGH] CWE-825 CVE-2024-39792: When the NGINX Plus is configured to use the MQTT pre-read module, undisclosed requests can cause an When the NGINX Plus is configured to use the MQTT pre-read module, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
cvelistv5nvd
CVE-2024-7347MEDIUMCVSS 5.7≥ r27, < r31vr31+2 more2024-08-14
CVE-2024-7347 [MEDIUM] CWE-126 CVE-2024-7347: NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally,
cvelistv5nvd
CVE-2024-32760MEDIUMCVSS 6.5vr30vr31+1 more2024-05-29
CVE-2024-32760 [MEDIUM] CWE-787 CVE-2024-32760: When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 encode When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 encoder instructions can cause NGINX worker processes to terminate or cause or other potential impact.
cvelistv5nvd
CVE-2024-34161MEDIUMCVSS 5.3vr30vr31+1 more2024-05-29
CVE-2024-34161 [MEDIUM] CWE-416 CVE-2024-34161: When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastruc When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory.
cvelistv5nvd
CVE-2024-31079MEDIUMCVSS 4.8vr30vr31+1 more2024-05-29
CVE-2024-31079 [MEDIUM] CWE-121 CVE-2024-31079: When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 reques When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate or cause other potential impact. This attack requires that a request be specifically timed during the connection draining process, which the attacker has no visibility and limited influence over.
cvelistv5nvd
CVE-2024-35200MEDIUMCVSS 5.3vr30vr31+1 more2024-05-29
CVE-2024-35200 [MEDIUM] CWE-476 CVE-2024-35200: When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 reques When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate.
cvelistv5nvd
CVE-2024-24989HIGHCVSS 7.5vr31≥ R31, < R31 P12024-02-14
CVE-2024-24989 [HIGH] CWE-476 CVE-2024-24989: When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . NOTE: Software versions
cvelistv5nvd
CVE-2024-24990HIGHCVSS 7.5vr30vr31+2 more2024-02-14
CVE-2024-24990 [HIGH] CWE-416 CVE-2024-24990: When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . Note: Software versio
cvelistv5nvd
CVE-2023-44487HIGHCVSS 7.5KEVPoC≥ r25, < r29vr29+1 more2023-10-10
CVE-2023-44487 [HIGH] CWE-400 CVE-2023-44487: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancell The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
nvd
CVE-2022-41741HIGHCVSS 7.8≥ R27, < R27-p1≥ R1, < R26-p12022-10-19
CVE-2022-41741 [HIGH] CWE-787 CVE-2022-41741: NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a spec
cvelistv5nvd
CVE-2022-41743HIGHCVSS 7.0≥ r22, ≤ r27≥ R27, < R27-p1+1 more2022-10-19
CVE-2022-41743 [HIGH] CWE-787 CVE-2022-41743: NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_hls_module NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_hls_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its crash or potential other impact using a specially crafted audio or video file. The issue affects only NGINX Plus when the hls directive is used in the configuration file.
cvelistv5nvd
CVE-2022-41742HIGHCVSS 7.1≥ R27, < R27-p1≥ R1, < R26-p12022-10-19
CVE-2022-41742 [HIGH] CWE-787 CVE-2022-41742: NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to cause a worker process crash, or might result in worker process memory disclosure by using a spe
cvelistv5nvd