{"id":"CVE-2024-39935","details":"jc21 NGINX Proxy Manager before 2.11.3 allows backend/internal/certificate.js OS command injection by an authenticated user (with certificate management privileges) via untrusted input to the DNS provider configuration. NOTE: this is not part of any NGINX software shipped by F5.","modified":"2026-04-09T10:20:59.806954Z","published":"2024-07-04T21:15:10.077Z","references":[{"type":"ADVISORY","url":"https://github.com/NginxProxyManager/nginx-proxy-manager/compare/v2.11.2...v2.11.3"},{"type":"REPORT","url":"https://github.com/NginxProxyManager/nginx-proxy-manager/issues/3662"},{"type":"FIX","url":"https://github.com/NginxProxyManager/nginx-proxy-manager/commit/99cce7e2b0da2978411cedd7cac5fffbe15bc46"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jc21/nginx-proxy-manager","events":[{"introduced":"0"},{"fixed":"35d7a3a407564cffe51fd2e815da5f999ecb1d9d"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.11.3"}]}},{"type":"GIT","repo":"https://github.com/nginxproxymanager/nginx-proxy-manager","events":[{"introduced":"0"},{"fixed":"99cce7e2b0da2978411cedd7cac5fffbe15bc46"}]}],"versions":["1.0.1","1.1.1","1.1.2","2.0.10","2.0.11","2.0.12","2.0.13","2.0.14","2.0.2","2.0.3","2.0.4","2.0.5","2.0.6","2.0.7","2.0.8","2.0.9","v2.1.0","v2.1.1","v2.1.2","v2.10.0","v2.10.1","v2.10.2","v2.10.3","v2.10.4","v2.11.0","v2.11.1","v2.11.2","v2.2.0","v2.2.1","v2.2.2","v2.2.3","v2.2.4","v2.3.0","v2.3.1","v2.4.0","v2.5.0","v2.6.0","v2.6.1","v2.6.2","v2.7.0","v2.7.1","v2.7.2","v2.7.3","v2.8.0","v2.8.1","v2.9.0","v2.9.10","v2.9.11","v2.9.12","v2.9.13","v2.9.14","v2.9.15","v2.9.16","v2.9.17","v2.9.18","v2.9.19","v2.9.20","v2.9.21","v2.9.22","v2.9.3","v2.9.8","v2.9.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-39935.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}