Heap-based Buffer Overflow in NGINX JavaScript js_fetch_proxy/ngx.fetch
CVE-2026-8711 is a heap-based buffer overflow in NGINX JavaScript (njs) affecting versions 0.9.4 through 0.9.8 in configurations using ngx_http_js_module. The issue occurs when the js_fetch_proxy directive is configured with at least one client-controlled NGINX variable, such as $http_, $arg_, or $cookie_*, and a location invokes the ngx.fetch() operation from NGINX JavaScript. An unauthenticated remote attacker can send crafted HTTP requests that manipulate those client-controlled values and trigger heap memory corruption in the NGINX worker process. The documented result is worker-process restart, and on systems with ASLR disabled, the memory corruption may be exploitable for code execution in the worker context.
Impact, mitigation & remediation
What it means. What to do now. For analysts and engineers who need to decide and keep moving.
Impact
What an attacker gets — and what they’ve been doing with it.
Mitigation
If you can’t patch tonight, do this now.
Remediation
Patch, then assume compromise.
Exploits
No public exploits tracked yet. Mallory keeps watching.
No public exploit code observed for this vulnerability.
Affected products & vendors
Products and vendors Mallory has correlated with this vulnerability. Open in Mallory to drill down to specific CPE configurations and version ranges.
Vendor-confirmed product mapping. Mallory continuously reconciles against your asset inventory in the product.
Recent activity
15 sources tracked across advisories, community write-ups, and news. Mallory keeps watching after this page renders.
A critical vulnerability affecting NGINX JavaScript (njs), specifically versions 0.9.4 to 0.9.8, referenced by F5 as an ngx_http_js_module vulnerability.
A heap-based buffer overflow in NGINX JavaScript (njs) related to js_fetch_proxy handling of client-controlled variables when used with ngx.fetch(), causing worker process crashes and potentially remote code execution under some conditions.
A heap buffer overflow vulnerability in NGINX JavaScript involving js_fetch_proxy with client-controlled NGINX variables and ngx.fetch(); it can be triggered remotely by unauthenticated crafted HTTP requests and may lead to worker process restart or possible code execution when ASLR is disabled.
See the full picture, correlated to your attack surface.
Query your assets running an affected version, and investigate the blast radius.
Every observed campaign linking this CVE to a named adversary.
Malware families riding this exploit, with evidence and IOCs.
YARA, Sigma, Snort, and vendor rules — auto-deployed to your SIEM.
Cross-references every affected SKU, including bundled OEM variants.
Community discussion across Reddit, Mastodon, and other social sources.