Description
Allowing null byte character (ASCII 0x00) in the URL can lead to a severe security risk. If the user can manipulate file contents on the server, this vulnerability may result in arbitrary PHP code execution, enabling attackers to take control of the server and execute unauthorized commands.
Recommendation
Upgrade Nginx to a version that properly sanitizes input and disallows null byte characters in URLs.
References
Related Issues
- Nginx Code Execution due to Misconfiguration - Vulnerability
- FUXA allows Remote Code Execution (RCE) via the project import functionality. - CVE-2025-69983
- Nginx Restriction Bypass via Space Character in URI - CVE-2013-4547
- FUXA Unauthenticated Remote Code Execution in Node-RED Integration - CVE-2026-25938
- Tags:
- Nginx
- Arbitrary Code Execution
- Input Validation
Anything's wrong? Let us know Last updated on May 13, 2024