Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K000161131 |
|
Wed, 13 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5
F5 nginx Open Source |
|
| Vendors & Products |
F5
F5 nginx Open Source |
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When NGINX Open Source is configured to proxy HTTP/2 traffic by setting proxy_http_version to 2, and also uses proxy_set_body, an attacker may be able to inject frame headers and payload bytes to the upstream peer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
| Title | NGINX ngx_http_proxy_v2_module vulnerability | |
| Weaknesses | CWE-172 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2026-05-13T16:16:54.456Z
Reserved: 2026-05-05T21:19:09.531Z
Link: CVE-2026-42926
Updated: 2026-05-13T16:06:25.462Z
Status : Awaiting Analysis
Published: 2026-05-13T16:16:49.640
Modified: 2026-05-13T16:27:11.127
Link: CVE-2026-42926
No data.
OpenCVE Enrichment
Updated: 2026-05-13T17:45:25Z