HTTP/2 Traffic Injection Vulnerability in NGINX Open Source by F5 Networks
CVE-2026-42926
6.3MEDIUM
What is CVE-2026-42926?
A vulnerability exists in NGINX Open Source when configured to proxy HTTP/2 traffic using the proxy_http_version set to 2 in conjunction with proxy_set_body. An attacker could exploit this configuration to inject frame headers and payload bytes directed at the upstream server, potentially leading to unauthorized access or data manipulation. Software versions that have reached End of Technical Support are excluded from evaluation.
Affected Version(s)
NGINX Open Source 1.29.4 < 1.30.1
NGINX Open Source 1.31.0
References
CVSS V4
Score:
6.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
F5 acknowledges Mufeed VH of Winfunc Research and Hcamael of aipyaipy for bringing this issue to our attention and following the highest standards of coordinated disclosure.