Vulnerability Details CVE-2026-32647
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 1.2%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2026-32647
-
cpe:2.3:a:f5:nginx_open_source:1.25.0
-
cpe:2.3:a:f5:nginx_open_source:1.25.1
-
cpe:2.3:a:f5:nginx_open_source:1.25.2
-
cpe:2.3:a:f5:nginx_open_source:1.25.3
-
cpe:2.3:a:f5:nginx_open_source:1.25.4
-
cpe:2.3:a:f5:nginx_open_source:1.26.1
-
cpe:2.3:a:f5:nginx_open_source:1.26.2
-
cpe:2.3:a:f5:nginx_open_source:1.27.0
-
cpe:2.3:a:f5:nginx_open_source:1.28.2
-
cpe:2.3:a:f5:nginx_open_source:1.29.0
-
cpe:2.3:a:f5:nginx_open_source:1.29.5
-
cpe:2.3:a:f5:nginx_open_source:1.3.0
-
cpe:2.3:a:f5:nginx_open_source:1.5.13
-
cpe:2.3:a:f5:nginx_plus:r32
-
cpe:2.3:a:f5:nginx_plus:r33
-
cpe:2.3:a:f5:nginx_plus:r34
-
cpe:2.3:a:f5:nginx_plus:r35
-
cpe:2.3:a:f5:nginx_plus:r36