PT-2026-27430 · Nginx+4 · Nginx Plus+6

Published

2026-03-24

·

Updated

2026-05-20

·

CVE-2026-27654

CVSS v2.0

8.5

High

VectorAV:N/AC:L/Au:N/C:N/I:P/A:C
Name of the Vulnerable Software and Affected Versions NGINX Open Source and NGINX Plus (affected versions not specified)
Description NGINX Open Source and NGINX Plus are affected by a buffer overflow in the ngx http dav module module. Exploitation of this issue may allow a remote attacker to cause a denial-of-service or potentially modify file names outside the document root. This occurs when the configuration file uses DAV module MOVE or COPY methods, prefix location, and alias directives. The impact on system integrity is limited due to the low privileges of the NGINX worker process user. A proof-of-concept exploit has been discovered, and exploit reproduction is possible after patch release. The vulnerability is triggered by crafted DAV requests and a short Destination header under an alias/dav combination. The issue was discovered with the assistance of AI-assisted research and human validation.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

RCE

Heap Based Buffer Overflow

Weakness Enumeration

Related Identifiers

ALSA-2026:6906
ALSA-2026:6907
ALSA-2026:6923
ALSA-2026:7002
ALSA-2026:7343
BDU:2026-04817
BIT-NGINX-2026-27654
BIT-NGINX-GATEWAY-2026-27654
CVE-2026-27654
OPENSUSE-SU-2026:10423-1
RHSA-2026:13680
RHSA-2026:13839
RHSA-2026:14836
RHSA-2026:6906
RHSA-2026:6907
RHSA-2026:6923
RHSA-2026:7002
RHSA-2026:7343
RHSA-2026:8346
USN-8210-1

Affected Products

Linuxmint
Nginx Open Source
Nginx Plus
Nginx
Red Os
Rocky Linux
Ubuntu