A critical, 18-year-old vulnerability in NGINX Open Source and NGINX Plus is under active exploitation. The vulnerability, identified as CVE-2026-42945 and nicknamed "NGINX Rift," is a heap buffer overflow in the ngx_http_rewrite_module. A remote, unauthenticated attacker can send a specially crafted HTTP request to a vulnerable server, causing the NGINX worker process to crash, resulting in a denial-of-service (DoS) condition. Under certain conditions, such as when Address Space Layout Randomization (ASLR) is disabled, the flaw could be leveraged for remote code execution (RCE). Security firm VulnCheck has confirmed detecting active exploitation attempts against its honeypots. F5, the developer of NGINX, has released patches, and immediate action is required.
CVE-2026-42945 is a heap-based buffer overflow vulnerability rooted in the way the ngx_http_rewrite_module handles URI rewrites. The flaw has a CVSS score of 9.2, reflecting its critical severity. Exploitation is contingent on a specific but common server configuration. The vulnerability is triggered when all of the following conditions are met:
rewrite directive is used in the NGINX configuration.rewrite directive uses an unnamed capture group (e.g., (.*) which is referenced by $1).?).rewrite directive is followed by another rewrite, if, or set directive.This combination of directives causes a miscalculation in the memory size required for the rewritten URI. The server allocates a buffer that is too small, and when the attacker provides a crafted request, data is written past the end of this buffer, corrupting the memory heap. This corruption reliably crashes the worker process and can potentially be controlled for arbitrary code execution.
The vulnerability affects a wide range of NGINX versions spanning nearly two decades:
Given that NGINX powers over a third of the world's websites, the number of potentially vulnerable systems is in the tens of millions.
Active exploitation began just days after the vulnerability's public disclosure. VulnCheck reported that its honeypot network detected exploitation attempts over the weekend of May 16-17, 2026. The current in-the-wild attacks appear focused on causing DoS by crashing worker processes. However, the public availability of a proof-of-concept (PoC) exploit increases the risk that more sophisticated attackers will develop a reliable RCE exploit, especially for targeting environments with weakened security postures (e.g., disabled ASLR).
The impact of CVE-2026-42945 is severe and widespread:
The following patterns may help identify vulnerable or compromised systems:
rewrite .* "...?..."nginx.conf and included files) for rewrite directives that use unnamed captures and contain a ? in the replacement string.error.log for an increase in worker process crashes or segmentation faults, especially if correlated with specific incoming requests.rewrite pattern. Automated scripts can be used to check for this across a large fleet of servers.access.log and error.log. Create SIEM alerts for a high rate of worker process crashes or for access attempts that match the exploit signature.Defensive D3FEND techniques like Inbound Traffic Filtering and File Content Rules can be used to build detection and blocking capabilities.
Immediate remediation is crucial. Organizations have two primary options:
Upgrade NGINX (Recommended): The most effective solution is to upgrade to a patched version. F5 has released:
Apply Workaround (If patching is not possible): If an immediate upgrade is not feasible, the vulnerability can be mitigated by modifying the NGINX configuration. The workaround involves replacing the unnamed regex capture with a named capture group.
rewrite ^/path/(.*)$ /newpath?arg=$1;rewrite "^/path/(?<capture>.*)$" /newpath?arg=$capture;This change avoids the code path with the buffer overflow vulnerability. After applying the workaround, reload the NGINX configuration (nginx -s reload).
The primary mitigation is to upgrade NGINX to a patched version (1.30.1+ for Open Source, R37+ for Plus) to fully remediate the vulnerability.
As a workaround, modify the NGINX configuration to use named capture groups instead of unnamed ones in rewrite rules to prevent triggering the flaw.
Use a Web Application Firewall (WAF) to filter malicious requests attempting to exploit the vulnerability before they reach the NGINX server.
Exploitation attempts targeting CVE-2026-42945 are detected against honeypot networks.
Multiple security news outlets report on the active in-the-wild exploitation.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.