Critical nginx-ui Flaw Under Active Exploitation Enables Full Server Takeover

by | Apr 16, 2026 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Critical nginx-ui Vulnerability Exploited in the Wild

A newly disclosed critical vulnerability affecting nginx-ui, an open-source web-based management tool for Nginx, is now being actively exploited by threat actors.

Tracked as CVE-2026-33032 with a CVSS score of 9.8, the flaw allows attackers to bypass authentication and gain full control over the Nginx service. The issue, dubbed MCPwn by Pluto Security, exposes a dangerous weakness in the tool’s Model Context Protocol (MCP) integration.

Authentication Bypass Opens Door to Full Server Control

The vulnerability stems from improper security controls applied to two HTTP endpoints: /mcp and /mcp_message.

While the /mcp endpoint enforces authentication and IP allowlisting, the /mcp_message endpoint only relies on IP filtering. Critically, the default configuration treats an empty IP whitelist as “allow all,” effectively exposing the endpoint to any external attacker.

This misconfiguration enables unauthorized users to invoke MCP tools without authentication, allowing them to:

  • Restart the Nginx service
  • Modify or delete configuration files
  • Trigger automatic configuration reloads

In practice, this grants attackers complete control over the web server.

The authentication gap between nginx-ui's two MCP endpoints
The authentication gap: both endpoints reach the same handler, but only one checks credentials.

Attack Chain Enables Rapid Exploitation

According to researcher Yotam Perkal, exploitation can be completed in seconds using a two-step process:

  1. Send a GET request to /mcp to establish a session and obtain a session ID
  2. Send a POST request to /mcp_message using the session ID to execute commands

Although session creation typically requires authentication, attackers can bypass this requirement by chaining a second critical vulnerability.

The cross-network attack flow for CVE-2026-33032
The attack flow: step 1 authenticates to get a session, step 2 uses that session to invoke destructive tools with zero authentication.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses



Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Backup Endpoint Flaw Leaks Sensitive Secrets

The attack leverages an additional flaw, CVE-2026-27944, present in versions prior to 2.3.3, which exposes sensitive data through the /api/backup endpoint.

This vulnerability allows unauthenticated attackers to download full system backups, which may contain:

  • Credentials
  • SSL private keys
  • Configuration data
  • A critical parameter called node_secret

The extracted node_secret can then be used to authenticate MCP sessions, enabling attackers to fully exploit the authentication bypass in CVE-2026-33032.

Risk of Traffic Interception and Credential Theft

Successful exploitation not only allows configuration tampering but also creates opportunities for deeper compromise.

Attackers could modify Nginx configurations to intercept incoming traffic, inject malicious responses, or harvest administrator credentials. This effectively turns the compromised server into a controlled interception point.

Thousands of Exposed Instances at Immediate Risk

Data from Shodan indicates that approximately 2,600 nginx-ui instances are publicly exposed, with the highest concentrations in China, the United States, Indonesia, Germany, and Hong Kong.

Given the simplicity and speed of exploitation, unpatched systems face immediate risk.

Patch Released, Mitigations Recommended

The vulnerability has been addressed in nginx-ui version 2.3.4, released on March 15, 2026. Organizations are strongly advised to upgrade immediately.

For those unable to patch right away, recommended mitigations include:

  • Enforcing authentication on the /mcp_message endpoint
  • Changing IP allowlisting behavior from “allow-all” to “deny-all”
  • Restricting network access to nginx-ui interfaces
  • Disabling MCP functionality where possible



Growing Risks Around MCP Integrations

Researchers warn that integrating MCP functionality into existing applications can introduce significant security risks if not properly secured.

Because MCP endpoints inherit application capabilities without inheriting full security controls, they can unintentionally create powerful backdoors that bypass authentication entirely.

Related MCP Vulnerabilities Highlight Broader Threat

The disclosure comes alongside the identification of additional MCP-related vulnerabilities in Atlassian’s MCP server, dubbed MCPwnfluence.

These flaws, tracked as CVE-2026-27825 and CVE-2026-27826, can be chained to achieve unauthenticated remote code execution within local networks, further underscoring the emerging risks associated with MCP implementations.

As adoption of MCP-based architectures grows, security experts warn that improper implementation could significantly expand the attack surface across enterprise environments.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Sources: thehackernews.com, pluto.security/blog

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This