Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-9256— NGINX ngx_http_rewrite_module vulnerability

CVSS 8.1 · High

Affected Version Matrix 6

VendorProductVersion RangeStatus
F5NGINX Open Source1.31.0< 1.31.1affected
1.30.0< 1.30.2affected
0.1.17< *affected
F5NGINX Plus37.0< 37.0.1.1affected
R36< R36 P5affected
R32< R32 P7affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-9256

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
NGINX ngx_http_rewrite_module vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when a rewrite directive uses a regex pattern with distinct, overlapping Perl-Compatible Regular Expression (PCRE) captures (for example, ^/((.*))$) and a replacement string that references multiple such captures (for example, $1$2) in a redirect or arguments context. An unauthenticated attacker along with conditions beyond their control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, attackers can execute code on systems with Address Space Layout Randomization (ASLR) disabled or when the attacker can bypass ASLR. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
堆缓冲区溢出
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
F5NGINX Plus 37.0 ~ 37.0.1.1 -
F5NGINX Open Source 1.31.0 ~ 1.31.1 -

II. Public POCs for CVE-2026-9256

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-9256

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-9256

No comments yet


Leave a comment