Ad

CVE-2026-27651

HIGH CVSS 4.0: 8.7 EPSS 0.04%
Updated Mar 30, 2026
F5
Parameter Value
CVSS 8.7 (HIGH)
Affected Versions 0.5.15 — r35
Fixed In 1.28.3
Type CWE-476 (NULL Pointer Dereference)
Vendor F5
Public PoC No

When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
None
No data modification
Availability
High
Complete denial of service

CVSS Vector v4.0

Vulnerable Products 14

Configuration From (including) Up to (excluding)
F5 Nginx_Open_Source
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
0.5.15 <= 0.9.7
F5 Nginx_Open_Source
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
1.0.0 1.28.3
F5 Nginx_Open_Source
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
1.29.0 1.29.7
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*
r33 r35
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:*
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r32:p1:*:*:*:*:*:*
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r32:p2:*:*:*:*:*:*
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r32:p3:*:*:*:*:*:*
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r32:p4:*:*:*:*:*:*
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r35:-:*:*:*:*:*:*
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r35:p1:*:*:*:*:*:*
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r36:-:*:*:*:*:*:*
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r36:p1:*:*:*:*:*:*
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r36:p2:*:*:*:*:*:*