When NGINX Plus or NGINX Open Source are configured to...
Moderate severity
Unreviewed
Published
May 13, 2026
to the GitHub Advisory Database
•
Updated May 13, 2026
Description
Published by the National Vulnerability Database
May 13, 2026
Published to the GitHub Advisory Database
May 13, 2026
Last updated
May 13, 2026
When NGINX Plus or NGINX Open Source are configured to use the HTTP/3 QUIC module, an attacker may be able to spoof their source IP address allowing for bypass of authorization or bypass of rate limiting. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References