๐Ÿ” CVE Alert

CVE-2026-42220

MEDIUM 6.5

nginx-ui: Authenticated settings disclosure exposes node.secret and enables trusted-node authentication abuse, backup exfiltration, and restore-based nginx-ui state rollback

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, an authenticated user can call GET /api/settings and retrieve sensitive configuration values, including node.secret. The same node.secret is accepted by AuthRequired() through the X-Node-Secret header (or node_secret query parameter), causing the request to be treated as authenticated via the trusted-node path and associated with the init user. This issue has been patched in version 2.3.8.

CWE CWE-200 CWE-863
Vendor 0xjacky
Product nginx-ui
Published May 4, 2026
Stay Ahead of the Next One

Get instant alerts for 0xjacky nginx-ui

Be the first to know when new medium vulnerabilities affecting 0xjacky nginx-ui are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

0xJacky / nginx-ui
< 2.3.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-7jrr-xw9c-mj39 github.com: https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.8