{"id":"ALPINE-CVE-2026-1642","details":"A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.","modified":"2026-02-05T15:30:19.003687Z","published":"2026-02-04T15:16:14.190Z","upstream":["CVE-2026-1642"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2026-1642"}],"affected":[{"package":{"name":"nginx","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/nginx?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.28.2-r0"}]}],"versions":["0.8.53-r0","0.8.54-r0","0.8.54-r1","1.0.11-r0","1.0.11-r1","1.0.14-r0","1.0.15-r0","1.0.4-r0","1.0.4-r1","1.0.5-r0","1.10.0-r0","1.10.1-r0","1.10.1-r1","1.10.1-r2","1.10.1-r3","1.10.1-r4","1.10.1-r5","1.10.1-r6","1.10.1-r7","1.10.1-r8","1.10.1-r9","1.10.2-r0","1.10.2-r1","1.10.3-r0","1.10.3-r1","1.10.3-r2","1.10.3-r3","1.10.3-r4","1.10.3-r5","1.12.0-r0","1.12.0-r1","1.12.0-r2","1.12.1-r0","1.12.1-r1","1.12.1-r2","1.12.1-r3","1.12.2-r0","1.12.2-r1","1.12.2-r2","1.12.2-r3","1.12.2-r4","1.12.2-r5","1.12.2-r6","1.14.0-r0","1.14.0-r1","1.14.0-r2","1.14.1-r0","1.14.2-r0","1.14.2-r1","1.16.0-r0","1.16.0-r1","1.16.0-r2","1.16.0-r3","1.16.0-r4","1.16.1-r0","1.16.1-r1","1.16.1-r2","1.16.1-r3","1.16.1-r4","1.16.1-r5","1.16.1-r6","1.16.1-r7","1.16.1-r8","1.18.0-r0","1.18.0-r1","1.18.0-r10","1.18.0-r11","1.18.0-r12","1.18.0-r13","1.18.0-r14","1.18.0-r15","1.18.0-r2","1.18.0-r3","1.18.0-r4","1.18.0-r5","1.18.0-r6","1.18.0-r7","1.18.0-r8","1.18.0-r9","1.2.2-r0","1.2.3-r0","1.2.4-r0","1.2.5-r0","1.2.6-r0","1.2.7-r0","1.2.8-r0","1.20.0-r0","1.20.1-r0","1.20.1-r1","1.20.1-r10","1.20.1-r11","1.20.1-r12","1.20.1-r13","1.20.1-r2","1.20.1-r3","1.20.1-r4","1.20.1-r5","1.20.1-r6","1.20.1-r7","1.20.1-r8","1.20.1-r9","1.20.2-r0","1.20.2-r1","1.20.2-r2","1.22.0-r0","1.22.0-r1","1.22.0-r2","1.22.0-r3","1.22.0-r4","1.22.0-r5","1.22.0-r6","1.22.0-r7","1.22.0-r8","1.22.1-r0","1.22.1-r1","1.22.1-r2","1.24.0-r0","1.24.0-r1","1.24.0-r10","1.24.0-r11","1.24.0-r12","1.24.0-r13","1.24.0-r14","1.24.0-r15","1.24.0-r16","1.24.0-r17","1.24.0-r18","1.24.0-r19","1.24.0-r2","1.24.0-r20","1.24.0-r3","1.24.0-r4","1.24.0-r5","1.24.0-r6","1.24.0-r7","1.24.0-r8","1.24.0-r9","1.26.0-r0","1.26.0-r1","1.26.0-r2","1.26.1-r0","1.26.1-r1","1.26.1-r2","1.26.1-r3","1.26.2-r0","1.26.2-r1","1.26.2-r2","1.26.2-r3","1.26.2-r4","1.26.3-r0","1.26.3-r1","1.26.3-r2","1.26.3-r3","1.26.3-r4","1.28.0-r0","1.28.0-r1","1.28.0-r2","1.28.0-r3","1.4.0-r0","1.4.0-r1","1.4.1-r0","1.4.2-r0","1.4.2-r1","1.4.3-r0","1.4.3-r1","1.4.4-r0","1.4.4-r1","1.4.4-r2","1.4.5-r0","1.4.6-r0","1.4.7-r0","1.6.0-r0","1.6.0-r1","1.6.0-r2","1.6.0-r3","1.6.1-r0","1.6.1-r1","1.6.2-r0","1.6.2-r1","1.6.2-r2","1.6.2-r3","1.6.3-r0","1.8.0-r0","1.8.0-r1","1.8.0-r2","1.8.0-r3","1.8.1-r0","1.8.1-r1","1.9.11-r0","1.9.14-r0","1.9.14-r1"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2026-1642.json"}},{"package":{"name":"nginx","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/nginx?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.28.2-r0"}]}],"versions":["0.8.53-r0","0.8.54-r0","0.8.54-r1","1.0.11-r0","1.0.11-r1","1.0.14-r0","1.0.15-r0","1.0.4-r0","1.0.4-r1","1.0.5-r0","1.10.0-r0","1.10.1-r0","1.10.1-r1","1.10.1-r2","1.10.1-r3","1.10.1-r4","1.10.1-r5","1.10.1-r6","1.10.1-r7","1.10.1-r8","1.10.1-r9","1.10.2-r0","1.10.2-r1","1.10.3-r0","1.10.3-r1","1.10.3-r2","1.10.3-r3","1.10.3-r4","1.10.3-r5","1.12.0-r0","1.12.0-r1","1.12.0-r2","1.12.1-r0","1.12.1-r1","1.12.1-r2","1.12.1-r3","1.12.2-r0","1.12.2-r1","1.12.2-r2","1.12.2-r3","1.12.2-r4","1.12.2-r5","1.12.2-r6","1.14.0-r0","1.14.0-r1","1.14.0-r2","1.14.1-r0","1.14.2-r0","1.14.2-r1","1.16.0-r0","1.16.0-r1","1.16.0-r2","1.16.0-r3","1.16.0-r4","1.16.1-r0","1.16.1-r1","1.16.1-r2","1.16.1-r3","1.16.1-r4","1.16.1-r5","1.16.1-r6","1.16.1-r7","1.16.1-r8","1.18.0-r0","1.18.0-r1","1.18.0-r10","1.18.0-r11","1.18.0-r12","1.18.0-r13","1.18.0-r14","1.18.0-r15","1.18.0-r2","1.18.0-r3","1.18.0-r4","1.18.0-r5","1.18.0-r6","1.18.0-r7","1.18.0-r8","1.18.0-r9","1.2.2-r0","1.2.3-r0","1.2.4-r0","1.2.5-r0","1.2.6-r0","1.2.7-r0","1.2.8-r0","1.20.0-r0","1.20.1-r0","1.20.1-r1","1.20.1-r10","1.20.1-r11","1.20.1-r12","1.20.1-r13","1.20.1-r2","1.20.1-r3","1.20.1-r4","1.20.1-r5","1.20.1-r6","1.20.1-r7","1.20.1-r8","1.20.1-r9","1.20.2-r0","1.20.2-r1","1.20.2-r2","1.22.0-r0","1.22.0-r1","1.22.0-r2","1.22.0-r3","1.22.0-r4","1.22.0-r5","1.22.0-r6","1.22.0-r7","1.22.0-r8","1.22.1-r0","1.22.1-r1","1.22.1-r2","1.24.0-r0","1.24.0-r1","1.24.0-r10","1.24.0-r11","1.24.0-r12","1.24.0-r13","1.24.0-r14","1.24.0-r15","1.24.0-r16","1.24.0-r17","1.24.0-r18","1.24.0-r19","1.24.0-r2","1.24.0-r20","1.24.0-r3","1.24.0-r4","1.24.0-r5","1.24.0-r6","1.24.0-r7","1.24.0-r8","1.24.0-r9","1.26.0-r0","1.26.0-r1","1.26.0-r2","1.26.1-r0","1.26.1-r1","1.26.1-r2","1.26.1-r3","1.26.2-r0","1.26.2-r1","1.26.2-r2","1.26.2-r3","1.26.2-r4","1.26.3-r0","1.26.3-r1","1.26.3-r2","1.26.3-r3","1.26.3-r4","1.28.0-r0","1.28.0-r1","1.28.0-r2","1.28.0-r3","1.28.0-r4","1.28.0-r5","1.28.0-r6","1.28.0-r7","1.28.0-r8","1.4.0-r0","1.4.0-r1","1.4.1-r0","1.4.2-r0","1.4.2-r1","1.4.3-r0","1.4.3-r1","1.4.4-r0","1.4.4-r1","1.4.4-r2","1.4.5-r0","1.4.6-r0","1.4.7-r0","1.6.0-r0","1.6.0-r1","1.6.0-r2","1.6.0-r3","1.6.1-r0","1.6.1-r1","1.6.2-r0","1.6.2-r1","1.6.2-r2","1.6.2-r3","1.6.3-r0","1.8.0-r0","1.8.0-r1","1.8.0-r2","1.8.0-r3","1.8.1-r0","1.8.1-r1","1.9.11-r0","1.9.14-r0","1.9.14-r1"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2026-1642.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"}]}