Heap-based buffer overflow in JavaScript module for NGINX - CVE-2026-8711
Published: May 20, 2026
JavaScript module for NGINX
Detailed vulnerability description
The vulnerability allows a remote attacker to cause a denial of service or execute arbitrary code.
The vulnerability exists due to heap-based buffer overflow in the ngx_http_js_module module when processing crafted HTTP requests that reach a location invoking ngx.fetch() with the js_fetch_proxy directive configured with at least one client-controlled NGINX variable. A remote attacker can send crafted HTTP requests to cause a denial of service or execute arbitrary code.
Code execution is possible on systems with Address Space Layout Randomization disabled. There is no control plane exposure; this is a data plane issue only.