Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover — Ravie LakshmananApr 15, 2026Web Security / Vulnerability [https://blo

actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeov

What’s new: A critical vulnerability (CVE-2026-33032) in nginx-ui, an open-source web-based Nginx management tool, has been actively exploited. This authentication bypass flaw allows attackers to take full control of the Nginx service, with a CVSS score of 9.8. The vulnerability affects the /mcp_message endpoint, which lacks proper authentication controls, enabling unauthorized access to critical MCP tools.

Who’s affected

Organizations using nginx-ui versions prior to 2.3.4 are at risk, particularly those with exposed instances on the internet. Approximately 2,689 instances are identified as publicly reachable, with a significant number located in China, the U.S., Indonesia, Germany, and Hong Kong.

What to do

  • Update to nginx-ui version 2.3.4 immediately to mitigate the vulnerability.
  • If unable to update, implement the “middleware.AuthRequired()” on the “/mcp_message” endpoint to enforce authentication.
  • Change the default IP allowlisting from “allow-all” to “deny-all” as a temporary measure.

Sources