CVE-2026-40460

EUVD-2026-29974
When NGINX Plus or NGINX Open Source are configured to use the HTTP/3 QUIC module, an attacker may be able to spoof their source IP address allowing for bypass of authorization or bypass of rate limiting.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
f5CNA
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
f5nginx_plus
1.26.0 ≤
𝑥
< 1.30.1
CNA
Debian logo
Debian Releases
Debian Product
Codename
nginx
bookworm
1.22.1-9+deb12u3
fixed
bookworm (security)
1.22.1-9+deb12u4
fixed
bullseye
1.18.0-6.1+deb11u3
fixed
bullseye (security)
1.18.0-6.1+deb11u5
fixed
forky
vulnerable
sid
vulnerable
trixie
vulnerable
trixie (security)
vulnerable