Nginx CVE-2026-42945

Started by wirehire, May 14, 2026, 08:09:11 PM

Previous topic - Next topic


Hey,

which version runs on the opnsense plugin for nginx?

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=295270

it came a to a critical heat buffer overflow.

Greets

That would be nginx-1.30.0,3, but only if you actually install the plugin.
Intel N100, 4* I226-V, 2* 82559, 16 GByte, 500 GByte NVME, ZTE F6005

1100 down / 450 up, Bufferbloat A+

so the fix is not in the version. it is possible to update from the cli? or only wait for the new plugin?

A new version of the plugin is not necessary but OPNsense needs to release an updated version of the NginX package.

If you use the plugin you can more or less easily check if you are affected by the most serious of the current set of vulnerabilities, which you correctly identified as CVE-2026-42945. It gives an unauthenticated RCE (remote code execution). Big bada-boom.

Put probably you don't need to worry.

1. Finde the location of the NginX configuration in OPNsense - if I read the plugin source correctly, it's in /usr/local/etc/nginx just like in a regular FreeBSD install.

2. Inspect all configuration files in there for "rewrite" statements. If there are none, you are not affected.

3. Inspect all rewrite statements for occurrences of an unnamed regular expression capture in the match expression, i.e. a regular expression wrapped in parentheses e.g. like so:
(.*)

4. If an unnamed regular expression capture is found, does the replace expression contain a question mark, e.g. like so:
/index.php?page=$1

If no such expression is found you are also not affected.

HTH,
Patrick
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

thanks, i look and found nothing. but zero trust on me , so i wait for the patch , and closed the front.

i though the packages come directly from freebsd , so a okg update ngixn worked. so thanks for the inside!