Description
A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Problem types
CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
Product status
1.3.0 (semver) before 1.29.5
R36 (custom) before R36 P2
R35 (custom) before R35 P1
R34 (custom) before *
R33 (custom) before *
R32 (custom) before R32 P4
Credits
F5
References
www.openwall.com/lists/oss-security/2026/02/05/1
my.f5.com/manage/s/article/K000159824