TopVuln

High-risk vulnerability digests

CVE-2026-33032

  • CRITICAL

Exploit for Missing Authentication for Critical Function in Nginxui Nginx_Ui

Details

CVSS v3
9.8
NVD published
2026-03-30 18:16:19
EPSS
5.0% probability · 89.7th percentile — 2026-04-17
Affected versions
cpe:2.3:a:nginxui:nginx_ui:*:*:*:*:*:*:*:*
Summary
Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting - and the default IP whitelist is empty, which the middleware treats as "allow all". This means any network attacker can invoke all MCP tools without authentication, including restarting nginx, creating/modifying/deleting nginx configuration files, and triggering automatic config reloads - achieving complete nginx service takeover. At time of publication, there are no publicly available patches.
Remediation
Not available in our cache.
Exploit info
https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h6c2-x2m2-mwhf

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.