๐Ÿ” CVE Alert

CVE-2026-33032

CRITICAL 9.8

Nginx UI: Unauthenticated MCP Endpoint Allows Remote Nginx Takeover

CVSS Score
9.8
EPSS Score
0.1%
EPSS Percentile
19th

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting - and the default IP whitelist is empty, which the middleware treats as "allow all". This means any network attacker can invoke all MCP tools without authentication, including restarting nginx, creating/modifying/deleting nginx configuration files, and triggering automatic config reloads - achieving complete nginx service takeover. At time of publication, there are no publicly available patches.

CWE CWE-306
Vendor 0xjacky
Product nginx-ui
Published Mar 30, 2026
Last Updated Apr 16, 2026
Stay Ahead of the Next One

Get instant alerts for 0xjacky nginx-ui

Be the first to know when new critical vulnerabilities affecting 0xjacky nginx-ui are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

0xJacky / nginx-ui
<= 2.3.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h6c2-x2m2-mwhf websec.net: https://websec.net/blog/cve-2026-33032-unauthenticated-nginx-ui-mcp-takeover-69e1200f9fceb1f3fbe9c47f