Vulnerability Description
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Nginx Plus | r32 |
| F5 | Nginx Open Source | >= 1.1.19, < 1.28.3 |
Related Weaknesses (CWE)
References
- https://my.f5.com/manage/s/article/K000160366Vendor Advisory
FAQ
What is CVE-2026-32647?
CVE-2026-32647 is a vulnerability with a CVSS score of 7.8 (HIGH). NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting ...
How severe is CVE-2026-32647?
CVE-2026-32647 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32647?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Nginx Plus, F5 Nginx Open Source.