Nginx 1.31.1 (CVE-2026-9256)

fln

Administrator
Staff member
Joined
Aug 30, 2021
Messages
1,374
We recommend all DirectAdmin using Nginx to upgrade to the latest version 1.30.2 or 1.31.1. This release fixes the CVE-2026-9256 vulnerability.

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when a rewrite directive uses a regex pattern with distinct, overlapping Perl-Compatible Regular Expression (PCRE) captures (for example, ^/((.*))$) and a replacement string that references multiple such captures (for example, $1$2) in a redirect or arguments context. An unauthenticated attacker along with conditions beyond their control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, attackers can execute code on systems with Address Space Layout Randomization (ASLR) disabled or when the attacker can bypass ASLR.
 
Back
Top