PT-2026-23481 · Nginx-Ui · Nginx-Ui

Tenbbughunters

·

Published

2026-03-05

·

Updated

2026-05-12

·

CVE-2026-27944

CVSS v3.1

10

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Nginx UI versions prior to 2.3.3
Description Nginx UI is a web user interface for the Nginx web server. A critical flaw exists where the '/api/backup' endpoint is accessible without authentication. When this endpoint is accessed, the server provides a full system backup and discloses the AES-256 encryption keys (key and IV) required to decrypt the backup within the 'X-Backup-Security' response header. This allows an unauthenticated remote attacker to download and immediately decrypt sensitive data, including user credentials, session tokens, SSL private keys, and Nginx configurations. The issue is caused by the CreateBackup() function in api/backup/router.go being registered without authentication middleware. Approximately 500 active instances were identified in the RuNet segment, with 35% potentially affected.
Recommendations Update Nginx UI to version 2.3.3 or higher. Restrict network access to the Nginx UI management interface so it is not accessible from the internet, utilizing a VPN or an allowlist of IP addresses. Rotate all secrets, including Nginx UI user passwords, SSL certificates, and session tokens. Implement additional authentication, such as HTTP Basic Authentication, at the reverse-proxy level. Monitor logs for unauthorized requests to the '/api/backup' endpoint or the presence of the 'X-Backup-Security' header in responses.

Exploit

Fix

Missing Encryption of Sensitive Data

Missing Authentication

Weakness Enumeration

Related Identifiers

BDU:2026-02720
CVE-2026-27944
GHSA-G9W5-QFFC-6762
GO-2026-4614
SUSE-SU-2026:1042-1

Affected Products

Nginx-Ui