We found results for “”
CVE-2026-1642
Good to know:
Date: February 4, 2026
A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Severity Score
Severity Score
Weakness Type (CWE)
Acceptance of Extraneous Untrusted Data With Trusted Data
CWE-349Top Fix
Upgrade Version
Upgrade to version https://github.com/nginx/nginx.git - release-1.28.2;https://github.com/nginx/nginx.git - release-1.29.5
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


