CVE-2026-42946
NGINX ngx_http_scgi_module and ngx_http_uwsgi_module vulnerability
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability exists in the ngx_http_scgi_module and ngx_http_uwsgi_module modules that may result in excessive memory allocation or an over-read of data. When scgi_pass or uwsgi_pass is configured, an unauthenticated attacker with man-in-the-middle (MITM) ability to control responses from an upstream server may be able to read the memory of the NGINX worker process or restart it. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| CWE | CWE-789 CWE-823 |
| Vendor | f5 |
| Product | nginx plus |
| Published | May 13, 2026 |
| Last Updated | May 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for f5 nginx plus
Be the first to know when new medium vulnerabilities affecting f5 nginx plus are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low
Affected Versions
F5 / NGINX Plus
R36 < R36 P4 R32 < R32 P6
F5 / NGINX Open Source
0.8.42 < 1.30.1
Credits
F5 acknowledges Zhenpeng (Leo) Lin of depthfirst for bringing this issue to our attention and following the highest standards of coordinated disclosure.