PT-2026-23481 · Nginx-Ui · Nginx-Ui
Tenbbughunters
·
Published
2026-03-05
·
Updated
2026-03-23
·
CVE-2026-27944
CVSS v2.0
10
Critical
| AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Nginx UI versions prior to 2.3.3
Description
Nginx UI, a web user interface for the Nginx web server, contains a critical flaw. The /api/backup endpoint is accessible without authentication, and it discloses the encryption keys needed to decrypt the backup in the X-Backup-Security response header. This allows an unauthenticated attacker to download a full system backup containing sensitive data, including user credentials, session tokens, SSL private keys, and Nginx configurations, and decrypt it immediately. Exploitation is straightforward, requiring only a single HTTP GET request. The backup archive contains files like database.db, app.ini, server.key/cert, nginx.conf, and sites-enabled/*, all encrypted with AES-256-CBC, but the encryption keys are exposed in the HTTP response header. This vulnerability has been assigned a CVSS score of 9.8 (Critical).
Recommendations
Update to version 2.3.3 or later.
Exploit
Fix
Missing Authentication
Missing Encryption of Sensitive Data
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Nginx-Ui