Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

CVE-2026-33032 in nginx-ui (CVSS 9.8) is actively exploited in the wild — authentication bypass gives attackers full Nginx server control. Update to 2.3.4 now.

nginx-ui-cve-2026-33032-actively-exploited

What’s new: A critical vulnerability (CVE-2026-33032) in nginx-ui, an open-source web-based Nginx management tool, is being actively exploited. This authentication bypass flaw allows attackers to take full control of Nginx servers. The vulnerability has a CVSS score of 9.8 and enables unauthorized access to MCP tools, allowing attackers to modify configurations and reload the server.

Who’s affected

Organizations using nginx-ui versions prior to 2.3.4 are at risk. There are approximately 2,689 exposed instances globally, primarily in China, the U.S., Indonesia, Germany, and Hong Kong.

What to do

  • Update to nginx-ui version 2.3.4 immediately.
  • If unable to update, disable MCP functionality and restrict network access.
  • Add “middleware.AuthRequired()” to the “/mcp_message” endpoint to enforce authentication.
  • Change the IP allowlisting default from “allow-all” to “deny-all.”

Sources