PT-2026-27430 · Nginx+4 · Nginx Plus+6
Published
2026-03-24
·
Updated
2026-05-20
·
CVE-2026-27654
CVSS v2.0
8.5
High
| Vector | AV:N/AC:L/Au:N/C:N/I:P/A:C |
Name of the Vulnerable Software and Affected Versions
NGINX Open Source and NGINX Plus (affected versions not specified)
Description
NGINX Open Source and NGINX Plus are affected by a buffer overflow in the
ngx http dav module module. Exploitation of this issue may allow a remote attacker to cause a denial-of-service or potentially modify file names outside the document root. This occurs when the configuration file uses DAV module MOVE or COPY methods, prefix location, and alias directives. The impact on system integrity is limited due to the low privileges of the NGINX worker process user. A proof-of-concept exploit has been discovered, and exploit reproduction is possible after patch release. The vulnerability is triggered by crafted DAV requests and a short Destination header under an alias/dav combination. The issue was discovered with the assistance of AI-assisted research and human validation.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
Heap Based Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Linuxmint
Nginx Open Source
Nginx Plus
Nginx
Red Os
Rocky Linux
Ubuntu