Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3804 articles · 153134 vulns · 38/41 feeds (7d)
← Back to list
4.8
CVE-2026-42934EXPLOITEDPATCHED
f5 · nginx plus

NGINX ngx_http_charset_module vulnerability

Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_charset_module module. When charset, source_charset, and charset_map and proxy_pass with disabled buffering ("off") directives are configured, unauthenticated attackers can send requests that with conditions beyond the attackers' control to cause a heap buffer over-read in the NGINX worker process, leading to limited disclosure of memory or a restart.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected Products

VendorProductVersions
f5nginx plusR36, R32, 0.3.50

References

  • https://my.f5.com/manage/s/article/K000161028(vendor-advisory, patch)

Related News (3 articles)

Tier E
Hacker News1h ago
CVE-2026-42945 – Critical heap buffer overflow in Nginx ngx_HTTP_rewrite_module
→ No new info (linked only)
Tier E
Lobsters Security2h ago
Achieving NGINX Remote Code Execution via an 18-Year-Old Vulnerability
→ No new info (linked only)
Tier C
VulDB5h ago
CVE-2026-42934 | F5 NGINX Plus/NGINX Open Source ngx_http_charset_module out-of-bounds (K000161028)
→ No new info (linked only)
CVSS 3.14.8 MEDIUM
VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
R37R36 P4R32 P61.31.01.30.1
CWECWE-125
PublishedMay 13, 2026
Last enriched5h agov2
Trending Score58
Source articles3
Independent3
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-42945EXP
NGINX ngx_http_rewrite_module vulnerability
Trending: 74
MEDIUMCVE-2026-40701EXP
NGINX ngx_http_ssl_module vulnerability
Trending: 58
HIGHCVE-2026-40629EXP
BIG-IP SSL/TLS vulnerability
Trending: 56
HIGHCVE-2026-40060EXP
BIG-IP Advanced WAF and ASM vulnerability
Trending: 56
HIGHCVE-2026-39455EXP
BIG-IP Configuration utility vulnerability
Trending: 56

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 13, 2026
Discovered by ZDM
May 13, 2026
Updated: description, severity, activelyExploited
May 13, 2026
Actively Exploited
May 13, 2026
Patch Available
May 13, 2026

Version History

v2
Last enriched 5h ago
v2Tier C5h ago

Updated vendor to F5, product to NGINX Open Source, changed severity to HIGH, and noted that no exploit is available.

descriptionseverityactivelyExploited
via VulDB
v15h ago

Initial creation