← Package directory
Available on winget

Install nginx

NGINX is the world's most popular Web Server, high performance Load Balancer, Reverse Proxy, API Gateway and Content Cache.

Install with winget
winget install --id nginxinc.nginx
Upgrade
winget upgrade --id nginxinc.nginx
Uninstall
winget uninstall --id nginxinc.nginx

About nginx

NGINX is the world's most popular Web Server, high performance Load Balancer, Reverse Proxy, API Gateway and Content Cache.

What's new in 1.31.0

*) Security: when using the "proxy_set_body" directive, an attacker might inject data in the proxied request to an HTTP/2 backend (CVE-2026-42926). Thanks to Mufeed VH of Winfunc Research. *) Security: a heap memory buffer overflow might occur in a worker process while handling a specially crafted request by ngx_http_rewrite_module, potentially resulting in arbitrary code execution (CVE-2026-42945). Thanks to Leo Lin. *) Security: a heap memory buffer overread might occur in a worker process while handling a specially crafted response by ngx_http_scgi_module or ngx_http_uwsgi_module, allowing an attacker to cause a disclosure of worker process memory or segmentation fault in a worker process (CVE-2026-42946). Thanks to Leo Lin. *) Security: a heap memory buffer overread might occur in a worker process while handling a specially sent response with decoding from UTF-8 via the "charset_map" directive, allowing an attacker to cause a limited disclosure of worker proccess memory or segmentation fault in a worker process (CVE-2026-42934). Thanks to David Carlier. *) Security: when using HTTP/3, processing of connection migration might cause new QUIC streams to receive a new client address before validation, allowing an attacker to cause address spoofing (CVE-2026-40460). Thanks to Rodrigo Laneth. *) Security: use-after-free might occur during DNS server response processing if the "ssl_ocsp" directive was used, allowing an attacker to cause worker process memory corruption or segmentation fault in a worker process (CVE-2026-40701). Thanks to Leo Lin. *) Change: now nginx rejects H...

Read release notes

Version history

Version Updated Notes
1.31.0 Unknown *) Security: when using the "proxy_set_body" directive, an attacker might inject data in the proxied request to an HTTP/2 backend (CVE-2026-42926). Thanks to Mufeed VH of Winfunc Research. *) Security: a heap memory buff...
1.29.8 Unknown Feature: the "max_headers" directive. Thanks to Maxim Dounin. Feature: OpenSSL 4.0 compatibility. Feature: now the "include" directive inside the "geo" block supports wildcards. Bugfix: in processing of HTTP 103 (Early H...
1.29.7 Unknown *) Security: a buffer overflow might occur while handling a COPY or MOVE request in a location with "alias", allowing an attacker to modify the source or destination path outside of the document root (CVE-2026-27654). Th...
1.29.6 Unknown Feature: session affinity support; the "sticky" directive in the "upstream" block of the "http" module; the "server" directive supports the "route" and "drain" parameters. Change: now nginx limits the size and rate of QU...
1.29.5 Unknown - Security: an attacker might inject plain text data in the response from an SSL backend (CVE-2026-1642). - Bugfix: use-after-free might occur after switching to the next gRPC or HTTP/2 backend. - Bugfix: an invalid HTTP...
1.29.4 Unknown Release notes
1.29.3 Unknown Release notes
1.29.2 Unknown Release notes
1.29.1 Unknown Release notes
1.29.0 Unknown Release notes
1.28.2 Unknown Release notes
1.28.1 Unknown Release notes
1.28.0 Unknown Release notes
1.27.5 Unknown Release notes
1.27.4 Unknown No notes
1.27.2 Unknown Release notes