CVE-2026-40460
NGINX ngx_quic_module vulnerability
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
When NGINX Plus or NGINX Open Source are configured to use the HTTP/3 QUIC module, an attacker may be able to spoof their source IP address allowing for bypass of authorization or bypass of rate limiting. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| CWE | CWE-290 |
| Vendor | f5 |
| Product | nginx plus |
| Published | May 13, 2026 |
| Last Updated | May 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for f5 nginx plus
Be the first to know when new medium vulnerabilities affecting f5 nginx plus are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
Low
Affected Versions
F5 / NGINX Plus
R36 < R36 P4 R32 < R32 P6
F5 / NGINX Open Source
1.26.0 < 1.30.1
Credits
🔍 F5 acknowledges Rodrigo Laneth of Miralium Research for bringing this issue to our attention and following the highest standards of coordinated disclosure.