nginx-poolslip: New Zero-Day Bypasses ASLR for RCE, No Patch
Security researchers disclose nginx-poolslip, an unpatched zero-day in NGINX 1.31.0 that defeats ASLR protection. Millions of servers at risk with no CVE or fix available yet.
A new zero-day vulnerability dubbed nginx-poolslip has been publicly disclosed in NGINX 1.31.0, the latest stable release of the world's most widely deployed web server software. The flaw enables remote code execution by bypassing Address Space Layout Randomization (ASLR)—and there's no patch yet.
Security researcher Vega from the NebSec security team announced the vulnerability on X (formerly Twitter) on May 20, 2026. The timing is particularly concerning: organizations that rushed to update to NGINX 1.31.0 to address the nginx-rift vulnerability we covered last week may now find themselves exposed to this new threat.
What Makes nginx-poolslip Dangerous
nginx-poolslip exploits a flaw in NGINX's internal memory pool handling mechanism. Unlike nginx-rift, which targeted a heap buffer overflow in the rewrite module, this vulnerability undermines ASLR—a foundational OS-level memory protection designed to randomize memory addresses and prevent exploitation of memory corruption bugs.
When ASLR is defeated, attackers can reliably predict where code and data reside in memory. This transforms what might be a probabilistic crash into a deterministic code execution path.
According to NebSec's disclosure, the vulnerability allows unauthenticated remote attackers to:
- Bypass ASLR protections across major Linux distributions
- Achieve arbitrary code execution on the underlying server
- Potentially compromise entire systems without prior authentication
The researchers confirmed that the nginx-rift patch failed to fully remediate the underlying memory pool attack surface, leaving the door open for nginx-poolslip to emerge in the updated codebase.
Scope of Exposure
NGINX powers approximately 34% of all websites globally, according to W3Techs. The server software handles traffic for millions of domains, from small personal blogs to enterprise infrastructure at organizations including Netflix, Cloudflare, and WordPress.com.
While the exact number of vulnerable servers remains unknown, any deployment running NGINX 1.31.0 or 1.30.1 (the versions patched for nginx-rift) should be considered at risk. Older versions may be affected as well, though NebSec has not yet released detailed version ranges.
No CVE, No Patch—What to Do Now
As of this writing, no CVE identifier has been assigned to nginx-poolslip. F5, which maintains the NGINX project, has not released an official patch or security advisory.
NebSec is following a 30-day responsible disclosure timeline, withholding the full technical writeup—including ASLR bypass details—until a patch becomes available. This gives F5 time to develop and distribute fixes, but it also means defenders are operating with limited technical information.
Interim Mitigations
Until a patch is available, organizations should consider:
- Enable additional hardening — Stack canaries, Control Flow Guard (CFG), and other compiler-level protections can raise the exploitation bar
- Network segmentation — Limit NGINX exposure to trusted networks where possible
- Web Application Firewall (WAF) — Deploy WAF rules to filter potentially malicious requests, though effectiveness against memory corruption exploits is limited
- Monitor for exploitation attempts — Watch for unusual crashes, memory errors, or unexpected process behavior in NGINX worker processes
Why This Pattern Keeps Repeating
nginx-poolslip is the second major NGINX vulnerability disclosed in 10 days. The nginx-rift flaw (CVE-2026-42945) stemmed from an 18-year-old bug in the rewrite module—code that had been shipping since 2006. That vulnerability was already being exploited in the wild before patches arrived.
The pattern reflects a broader problem: foundational internet infrastructure often runs on code written before modern security practices became standard. When researchers turn their attention to these codebases, they tend to find things. Memory pool handling, URL parsing, regex processing—all areas where complexity meets performance pressure, and security vulnerabilities accumulate.
For deeper context on how supply chain and infrastructure vulnerabilities cascade through organizations, see our coverage of the TanStack npm compromise and the subsequent Grafana breach.
What Comes Next
F5's security team is presumably working on a fix, though the company hasn't publicly acknowledged nginx-poolslip yet. The 30-day disclosure window suggests technical details could become public around June 20, 2026, regardless of patch status.
Organizations running NGINX in production should subscribe to NGINX's security advisories and monitor for updates. Given the severity—remote code execution with ASLR bypass—expect this to receive a critical CVSS rating once a CVE is assigned.
The lack of authentication requirements and the ubiquity of NGINX make this a high-priority issue. Don't wait for the CVE to start planning your response.
Related Articles
NGINX Rift: 18-Year-Old Heap Overflow Enables RCE on Web Servers
CVE-2026-42945 is a critical heap buffer overflow in NGINX's rewrite module that went undetected since 2008. CVSS 9.2 with public PoC available—patch now.
May 15, 2026ImageMagick Zero-Days Enable RCE on Linux, WordPress via Image Upload
AI-discovered vulnerabilities bypass all security policies including 'secure' mode. Most servers won't receive fixes until 2027 without manual intervention.
Apr 6, 2026FortiClient EMS Zero-Day Under Active Exploit — Patch Now
CVE-2026-35616 lets attackers bypass API authentication in FortiClient EMS 7.4.5-7.4.6 for unauthenticated RCE. Exploitation began March 31. Emergency hotfixes available.
Apr 5, 2026CISA KEV Deadline Hits Today for Unpatched Gogs Zero-Day
CVE-2025-8110 allows authenticated attackers to achieve RCE on self-hosted Git servers via path traversal. Over 700 instances already compromised.
Feb 2, 2026