CVE-2026-42220
nginx-ui: Authenticated settings disclosure exposes node.secret and enables trusted-node authentication abuse, backup exfiltration, and restore-based nginx-ui state rollback
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, an authenticated user can call GET /api/settings and retrieve sensitive configuration values, including node.secret. The same node.secret is accepted by AuthRequired() through the X-Node-Secret header (or node_secret query parameter), causing the request to be treated as authenticated via the trusted-node path and associated with the init user. This issue has been patched in version 2.3.8.
| CWE | CWE-200 CWE-863 |
| Vendor | 0xjacky |
| Product | nginx-ui |
| Published | May 4, 2026 |
Stay Ahead of the Next One
Get instant alerts for 0xjacky nginx-ui
Be the first to know when new medium vulnerabilities affecting 0xjacky nginx-ui are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
0xJacky / nginx-ui
< 2.3.8