Buffer Overflow Vulnerability in NGINX Open Source and NGINX Plus
CVE-2026-27654
What is CVE-2026-27654?
A vulnerability exists within the ngx_http_dav_module of NGINX Open Source and NGINX Plus that can be exploited to trigger a buffer overflow in the NGINX worker process. This scenario is possible when configuration files utilize the DAV module's MOVE or COPY methods combined with specific prefix locations and alias directives. Although this vulnerability could lead to the termination of the NGINX worker process or unauthorized naming modifications of file sources or destinations outside the document root, its overall impact is mitigated due to the limited privileges of the NGINX worker process user.
Affected Version(s)
NGINX Open Source 1.29.0 < 1.29.7
NGINX Open Source 0.5.13 < 1.28.3
NGINX Plus R36
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved