Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27654: CWE-122: Heap-based Buffer Overflow in F5 NGINX Open Source

0
High
VulnerabilityCVE-2026-27654cvecve-2026-27654cwe-122
Published: Tue Mar 24 2026 (03/24/2026, 14:13:26 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: NGINX Open Source

Description

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 15:08:34 UTC

Technical Analysis

CVE-2026-27654 is a heap-based buffer overflow vulnerability classified under CWE-122 found in the ngx_http_dav_module of F5's NGINX Open Source and NGINX Plus products. This flaw arises when the server configuration employs the DAV module's MOVE or COPY HTTP methods in conjunction with prefix location configurations (non-regular expression) and alias directives. An attacker can craft specially designed HTTP requests exploiting these conditions to trigger a buffer overflow in the NGINX worker process. The overflow may lead to the termination (crash) of the worker process or unauthorized modification of source or destination file names outside the intended document root directory. However, the impact on system integrity is somewhat limited because the NGINX worker process operates with low privileges, restricting access to the broader system. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The affected versions include NGINX Open Source 1.29.0 and 0.5.13. Although no public exploits have been reported yet, the vulnerability has been assigned a CVSS 3.1 base score of 8.2, reflecting high severity due to its potential to disrupt service availability and integrity. The issue does not affect versions that have reached End of Technical Support. No official patches were linked at the time of publication, so mitigation may require configuration changes or updates once available.

Potential Impact

The primary impact of this vulnerability is on the availability and integrity of NGINX web servers configured with the DAV module MOVE or COPY methods alongside prefix location and alias directives. Successful exploitation can cause the NGINX worker process to crash, resulting in denial of service and potential disruption of web services. Additionally, there is a risk of unauthorized modification of file names outside the document root, which could lead to data integrity issues or unauthorized file manipulation within the limited scope of the worker process's permissions. Although the worker process runs with low privileges, the ability to alter file names could be leveraged in chained attacks or to disrupt web content delivery. Organizations relying on NGINX for critical web infrastructure may face service outages or data integrity concerns. The vulnerability is exploitable remotely without authentication, increasing the attack surface and risk, especially for internet-facing servers. The lack of known exploits in the wild currently reduces immediate risk, but the high CVSS score and ease of exploitation warrant urgent attention.

Mitigation Recommendations

Organizations should prioritize upgrading to patched versions of NGINX Open Source and NGINX Plus once they become available from F5. In the interim, administrators should review and modify their NGINX configurations to avoid using the DAV module's MOVE or COPY methods in combination with prefix location and alias directives. Specifically, disabling or restricting the DAV module functionality or avoiding the use of prefix location configurations with alias directives can reduce exposure. Employing strict access controls and limiting the exposure of NGINX servers to trusted networks can also mitigate risk. Monitoring NGINX worker process stability and logs for unusual crashes or file modification attempts can help detect exploitation attempts. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block suspicious MOVE or COPY HTTP requests targeting the DAV module. Finally, ensure that the NGINX worker process runs with the least privileges necessary and that file system permissions are tightly controlled to limit the impact of any potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
f5
Date Reserved
2026-03-18T16:06:38.448Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2a3a3f4197a8e3b3ed93b

Added to database: 3/24/2026, 2:45:55 PM

Last enriched: 3/24/2026, 3:08:34 PM

Last updated: 3/26/2026, 4:31:56 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses