CVE-2026-42926

EUVD-2026-30006
When NGINX Open Source is configured to proxy HTTP/2 traffic by setting proxy_http_version to 2, and also uses proxy_set_body, an attacker may be able to inject frame headers and payload bytes to the upstream peer.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
f5CNA
5.8 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
f5nginx_open_source
1.29.4 ≤
𝑥
< 1.30.1
CNA
Debian logo
Debian Releases
Debian Product
Codename
nginx
bookworm
1.22.1-9+deb12u3
fixed
bookworm (security)
1.22.1-9+deb12u4
fixed
bullseye
1.18.0-6.1+deb11u3
fixed
bullseye (security)
1.18.0-6.1+deb11u5
fixed
forky
vulnerable
sid
vulnerable
trixie
1.26.3-3+deb13u2
fixed
trixie (security)
1.26.3-3+deb13u2
fixed