CVE-2026-42945

F5 · NGINX

A heap buffer overflow vulnerability exists in the ngx_http_rewrite_module of NGINX, which can be triggered by crafted HTTP requests to cause service crashes or potential remote code execution.

Executive summary

The "NGINX Rift" heap buffer overflow vulnerability in NGINX Open Source and NGINX Plus poses a significant risk of service disruption and potential remote code execution.

Vulnerability

This is a heap buffer overflow (CWE-122) in the ngx_http_rewrite_module, which is accessible to unauthenticated remote attackers. The flaw is triggered by specific configurations using unnamed PCRE captures when combined with crafted HTTP requests.

Business impact

The vulnerability carries a CVSS score of 8.1, indicating a high severity. Successful exploitation could lead to denial-of-service via worker process crashes or, in specific environments, remote code execution. This poses a critical risk to web infrastructure availability and the integrity of data processed by public-facing NGINX instances.

Remediation

Immediate Action: Upgrade to NGINX 1.30.1 (stable) or 1.31.0 (mainline) immediately, or consult the vendor advisory for specific patches for NGINX Plus and integrated F5 products.

Proactive Monitoring: Monitor NGINX error logs for recurring worker process crashes or segmentation faults, which may indicate exploitation attempts.

Compensating Controls: While a WAF may struggle to inspect the specific internal rewrite logic, ensure that strict request validation is enabled to block malformed or unusually long HTTP headers and request strings.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Due to confirmed exploitation in the wild and the availability of functional proof-of-concept code, this vulnerability must be treated as a priority. Administrators should audit their NGINX configurations for the vulnerable rewrite patterns and apply the official vendor patches immediately to prevent service degradation and potential system compromise.