PT-2026-29092 · Nginx+1 · Nginx+1

Yotampe-Pluto

·

Published

2026-03-28

·

Updated

2026-04-16

·

CVE-2026-33032

CVSS v2.0

10

Critical

AV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions nginx-ui versions prior to 2.3.4
Description An authentication bypass exists in the Model Context Protocol (MCP) integration of nginx-ui. The software exposes two HTTP endpoints: '/mcp' and '/mcp message'. While '/mcp' requires both IP whitelisting and authentication via the AuthRequired() middleware, the '/mcp message' endpoint only applies IP whitelisting. Because the default IP whitelist is empty, the middleware treats this as allow-all, permitting any network attacker to invoke MCP tools without authentication. This allows remote attackers to restart nginx, create, modify, or delete configuration files, and trigger automatic configuration reloads, leading to a complete takeover of the nginx service. Approximately 2,689 to 14,300 exposed instances have been identified globally. This issue is actively exploited in the wild.
Recommendations Update to version 2.3.4 or newer. As a temporary workaround, disable the MCP functionality or restrict network access to the management interfaces to prevent unauthorized access to the '/mcp message' endpoint.

Exploit

Fix

RCE

Missing Authentication

Weakness Enumeration

Related Identifiers

BDU:2026-04537
CVE-2026-33032
GHSA-H6C2-X2M2-MWHF
GO-2026-4904
SUSE-SU-2026:1205-1

Affected Products

Nginx
Nginx-Ui