Critical NGINX Vulnerability Exploited: PoC Code Released, Raising Security Concerns
A critical vulnerability in the NGINX web server, identified as CVE-2026-42945, has been disclosed with the release of proof-of-concept (PoC) exploit code. This vulnerability, which has a CVSS score of 9.2, was patched recently by F5 as part of their quarterly update. The flaw is a heap buffer overflow in the ngx_http_rewrite_module, which can lead to a denial-of-service (DoS) condition and potentially remote code execution (RCE) if Address Space Layout Randomization (ASLR) is disabled. The vulnerability affects NGINX servers using rewrite and set directives, and it involves a two-pass process in the script engine that can result in an undersized buffer allocation. This allows attacker-controlled data to overflow the buffer, potentially leading to RCE. F5 has released patches for NGINX Plus and open-source versions to address this issue.