Buffer Overflow Vulnerability in NGINX Open Source and NGINX Plus
CVE-2026-27654
Key Information:
- Vendor
F5
- Vendor
- CVE Published:
- 24 March 2026
Badges
What is CVE-2026-27654?
CVE-2026-27654 is a critical vulnerability identified within the NGINX Open Source and NGINX Plus web servers, specifically within the ngx_http_dav_module module. NGINX, a popular web server and reverse proxy server, is widely used for serving web applications and providing load balancing. This vulnerability enables the potential for a buffer overflow within the NGINX worker process when specific DAV module methods—such as MOVE or COPY—are employed, particularly with configurations that include non-regular expression location configurations and alias directives. Such exploitation could lead to the termination of the NGINX worker process or allow unauthorized modification of file names beyond the designated document root. This presents a risk for organizations utilizing NGINX since it may result in downtime, disruption of web services, and data integrity issues.
Potential impact of CVE-2026-27654
-
Service Disruption: Exploitation of this vulnerability can cause the NGINX worker process to terminate, potentially leading to downtime and disruption of critical web services hosted on affected systems.
-
Unauthorized File Manipulation: Attackers could leverage this vulnerability to modify source and destination file names outside of the intended directory structures, posing risks to data integrity and unauthorized access to files.
-
Limited Privilege Escalation: While the NGINX worker process operates with low privileges, any successful exploitation could lead to further attacks or system misconfigurations, compounding security risks.
Affected Version(s)
NGINX Open Source 1.29.0 < 1.29.7
NGINX Open Source 0.5.13 < 1.28.3
NGINX Plus R36
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 📈
Vulnerability started trending
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved