On April 9, 2022, some were publicly shared security gaps in its reference implementation NGINX LDAP (NGINX LDAP reference implementation).
It should be noted that only the reference implementation process is affected. NGINX Open Source and NGINX Plus are not affected by themselves and no corrective action is required if you are not using the reference implementation function.
NGINX LDAP reference implementation uses the Lightweight Directory Access Protocol (LDAP) to authenticate NGINX-mediated applications.
The exploit published as a Python daemon and contains the relevant NGINX settings in the address https://github.com/nginxinc/nginx-ldap-auth. The purpose and settings of the script are described in detail on its blog Nginx.
The same blog mentions various LDAP reference implementations that are affected by security vulnerabilities. Take a look at whether any of the conditions listed apply. In addition to the references to the conditions you will also find how to mitigate them.