CVE-2026-40460

NameCVE-2026-40460
DescriptionWhen NGINX Plus or NGINX Open Source are configured to use the HTTP/3 QUIC module, an attacker may be able to spoof their source IP address allowing for bypass of authorization or bypass of rate limiting.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nginx (PTS)bullseye1.18.0-6.1+deb11u3fixed
bullseye (security)1.18.0-6.1+deb11u5fixed
bookworm1.22.1-9+deb12u6fixed
bookworm (security)1.22.1-9+deb12u7fixed
trixie1.26.3-3+deb13u4vulnerable
trixie (security)1.26.3-3+deb13u5fixed
forky1.30.0-2vulnerable
sid1.30.0-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nginxsourcebullseye(not affected)
nginxsourcebookworm(not affected)
nginxsourcetrixie1.26.3-3+deb13u5
nginxsource(unstable)1.30.0-4

Notes

[bookworm] - nginx <not-affected> (Vulnerable code not present, introduced in 1.25.0)
[bullseye] - nginx <not-affected> (Vulnerable code not present, introduced in 1.25.0)
https://my.f5.com/manage/s/article/K000161068
https://nginx.org/en/security_advisories.html
https://github.com/nginx/nginx/commit/5461e8bbc09230a4cf8e3d7737c176ae69b091f1 (release-1.30.1)

Search for package or bug name: Reporting problems