Signal

Critical 18-year-old remote code execution flaw found in NGINX rewrite module

Evidence first: scan the strongest sources, then decide whether to go deeper.

Published 2026-05-14 06:00 UTCUpdated 2026-05-14 23:56 UTC
rss
cvevulnerabilitysecurity_toolingincident_response
Trend in the last 24h
Current brief openSource links open
This current signal is open on the public brief with summary, metadata, source links, and full evidence. Pro adds compare-over-time, alerts, exports, and workflow.
No card needed for the free brief.
Evidence trail (top sources)
top sources (4 domains)domains are deduped. counts indicate coverage, not truth.
4 top sources shown
nginx: CVSS (Max): 8.1
AusCERT - Bulletins · portal.auscert.org.au · 2026-05-14 23:56 UTC
USN-8271-1: nginx vulnerability
Ubuntu Security Notices · ubuntu.com · 2026-05-14 12:03 UTC
Overview

Security researchers have uncovered a critical heap buffer overflow vulnerability in the NGINX web server's ngx_http_rewrite_module that has existed unnoticed for 18 years. Tracked as CVE-2026-42945 with a CVSS v4 score of 9.2, this flaw allows unauthenticated remote code execution or denial of service.

Entities
DepthFirst AINGINX
Score total
1.43
Momentum 24h
5
Posts
5
Origins
5
Source types
1
Duplicate ratio
0%
Why now
  • The flaw was discovered and publicly disclosed in May 2026, prompting urgent patching.
  • Patches are available, but many systems remain vulnerable if not updated promptly.
  • AI-powered tools are increasingly uncovering long-standing security issues missed by traditional methods.
Why it matters
  • NGINX powers nearly one third of all websites, so this flaw risks widespread impact.
  • The vulnerability allows unauthenticated remote code execution, a severe security risk.
  • Long undetected, it highlights challenges in securing critical open-source infrastructure.
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
  • A critical heap buffer overflow vulnerability in NGINX's ngx_http_rewrite_module enables remote code execution.
  • The vulnerability affects NGINX versions from 0.6.27 to 1.30.0 and has been patched in versions 1.31.0 and 1.30.1.
How sources frame it
  • The Hacker News: neutral
All evidence
All evidence
The Hacker News - NGINX rewrite module flaw
thehackernews.com · thehackernews.com · 2026-05-14 06:00 UTC
nginx: CVSS (Max): 8.1
AusCERT - Bulletins · portal.auscert.org.au · 2026-05-14 23:56 UTC
Critical 'NGINX Rift' vulnerability discovered, present for 18 years
SC Media · scworld.com · 2026-05-14 23:38 UTC
AI agent finds 18-year-old remote code execution flaw in Nginx
CSO Online · csoonline.com · 2026-05-14 23:06 UTC
USN-8271-1: nginx vulnerability
Ubuntu Security Notices · ubuntu.com · 2026-05-14 12:03 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 5Origin domains: 5Duplicates: -
Showing 5 / 0
Top publishers (this list)
  • thehackernews.com (1)
  • AusCERT - Bulletins (1)
  • SC Media (1)
  • CSO Online (1)
  • Ubuntu Security Notices (1)
Top origin domains (this list)
  • thehackernews.com (1)
  • portal.auscert.org.au (1)
  • scworld.com (1)
  • csoonline.com (1)
  • ubuntu.com (1)