Nginx 0.7.22 < 1.29.1 Buffer Over-read

medium Web App Scanning Plugin ID 114954

Synopsis

Nginx 0.7.22 < 1.29.1 Buffer Over-read

Description

According to its Server response header, the installed version of nginx is from 0.7.22 to 1.29.0. It is, therefore, affected by a buffer over-read vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to nginx version 1.29.1 or later.

See Also

https://my.f5.com/manage/s/article/K000152786

Plugin Details

Severity: Medium

ID: 114954

Type: remote

Published: 9/3/2025

Updated: 9/3/2025

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Low

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2025-53859

CVSS v3

Risk Factor: Low

Base Score: 3.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS Score Source: CVE-2025-53859

CVSS v4

Risk Factor: Medium

Base Score: 6.3

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2025-53859

Vulnerability Information

CPE: cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 8/12/2025

Reference Information

CVE: CVE-2025-53859