NGINX Rift — LLM-Powered Researcher Finds 18-Year-Old RCE (CVSS 9.2) in 1/3 of All Websites
AI relevance: An LLM-powered vulnerability research platform from DepthFirst AI discovered four bugs in NGINX — including an 18-year-old unauthenticated RCE — proving that AI-assisted code analysis is now outpacing human audits on foundational infrastructure used by AI serving stacks.
What happened
- Security startup DepthFirst AI disclosed CVE-2026-42945 (CVSS 9.2), dubbed "NGINX Rift" — a heap buffer overflow in the
ngx_http_rewrite_modulethat has existed in NGINX since version 0.6.27 (2008). - The vulnerability was found using DepthFirst's LLM-powered research platform, which identified four bugs in NGINX total — including this critical RCE.
- The flaw triggers when a
rewritedirective is followed by arewrite,if, orsetdirective with an unnamed PCRE capture group (e.g.,$1) and a replacement string containing a question mark. - Exploitation causes a server crash (DoS) by default, and arbitrary code execution on systems with ASLR disabled.
- NGINX powers nearly one-third of all websites and is commonly used as a reverse proxy and load balancer for AI model serving endpoints.
- DepthFirst published a proof-of-concept exploit on GitHub, accelerating the urgency for patching.
- Researchers note NGINX's multi-process architecture makes exploitation more reliable: crashing a worker simply spawns a new one with identical memory layout, enabling repeated exploitation attempts.
Why it matters
This is the latest example of AI-powered vulnerability research finding critical flaws that decades of human auditing missed. For AI infrastructure teams, NGINX is a core component in almost every model serving deployment — as a reverse proxy for vLLM, Triton, or custom API gateways. The rewrite directive patterns that trigger this bug are common in API gateway configurations for versioned model endpoints. A public PoC means exploitation is likely imminent.
What to do
- Upgrade immediately: NGINX 1.31.0, 1.30.1, or NGINX Plus R36 P4 / R32 P6 / 37.0.0.
- Check your rewrite rules: Any configuration using
rewrite+setwith PCRE captures and question marks in the replacement string is exploitable. - AI serving stacks: If you run NGINX in front of model serving (vLLM, Triton, etc.), treat this as P0 — model API gateways frequently use the exact rewrite patterns that trigger this vulnerability.
- Note: Several F5 products based on NGINX (Instance Manager, WAF, Gateway Fabric, Ingress Controller) have not yet received patches — check vendor advisories.