Nginx 1.3.0 < 1.29.5 SSL Upstream Injection

high Web App Scanning Plugin ID 115141

Synopsis

Nginx 1.3.0 < 1.29.5 SSL Upstream Injection

Description

According to its Server response header, the installed version of nginx is from 1.3.0 to 1.29.4. It is, therefore, affected by a vulnerability when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side-along with conditions beyond the attacker's control-may be able to inject plain text data into the response from an upstream proxied server.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to nginx version 1.29.5 or later.

See Also

https://my.f5.com/manage/s/article/K000159824

Plugin Details

Severity: High

ID: 115141

Type: remote

Published: 2/11/2026

Updated: 2/11/2026

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:C/A:N

CVSS Score Source: CVE-2026-1642

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS Score Source: CVE-2026-1642

CVSS v4

Risk Factor: High

Base Score: 8.2

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2026-1642

Vulnerability Information

CPE: cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2/3/2026

Reference Information

CVE: CVE-2026-1642