Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical nginx-ui Flaw Allows Full Server Control

Critical nginx-ui Flaw Allows Full Server Control

Posted on April 15, 2026 By CWS

A newly uncovered security vulnerability in nginx-ui, a popular open-source tool for managing Nginx servers, is being actively exploited, posing significant risks to users. Identified as CVE-2026-33032, the flaw has been assigned a CVSS score of 9.8, indicating its critical nature. This authentication bypass vulnerability allows attackers to gain control over Nginx services, a situation that has been termed ‘MCPwn’ by Pluto Security.

Details of the Vulnerability

The vulnerability arises from the nginx-ui’s MCP integration, which exposes two HTTP endpoints: /mcp and /mcp_message. While the /mcp endpoint requires both IP whitelisting and authentication, the /mcp_message endpoint only requires IP whitelisting. However, the default IP whitelist is set to allow all, leading to potential unauthorized access.

Researcher Yotam Perkal from Pluto Security discovered that attackers can exploit this flaw with two simple HTTP requests. First, they send a GET request to the /mcp endpoint to establish a session and acquire a session ID. Then, using this session ID, they send a POST request to the /mcp_message endpoint, executing any MCP tool without needing authentication.

Impact and Exploitation

The exploitation of this vulnerability can enable attackers to alter Nginx configurations, restart servers, and even intercept administrator credentials. The flaw was patched on March 15, 2026, in version 2.3.4. Users are advised to update immediately or implement workarounds such as enforcing authentication on the /mcp_message endpoint or altering the IP whitelist settings.

A report by Recorded Future highlights CVE-2026-33032 as one of the most exploited vulnerabilities in March 2026. Despite the patch, the exact scale of exploitation remains unclear.

Recommendations and Future Outlook

Data from Shodan indicates nearly 2,689 nginx-ui instances are exposed online, predominantly in China, the U.S., Indonesia, Germany, and Hong Kong. Organizations using nginx-ui should urgently update to version 2.3.4 or disable MCP functionality as a temporary measure.

This issue follows the detection of other vulnerabilities in the Atlassian MCP server, emphasizing the need for heightened vigilance in network security. The swift action to address these flaws is crucial to prevent unauthorized access and potential data breaches.

The discovery of such vulnerabilities underscores the importance of maintaining up-to-date software and implementing robust security measures to protect against emerging threats.

The Hacker News Tags:authentication bypass, CVE-2026-33032, Cybersecurity, network security, Nginx-UI, Pluto Security, security flaw, server security, software update, Vulnerability

Post navigation

Previous Post: Insights from Sophos CISO Ross McKerchar
Next Post: Capsule Security Unveils AI Protection with $7M Funding

Related Posts

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms The Hacker News
Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware The Hacker News
A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do The Hacker News
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams The Hacker News
Google Addresses Critical Chrome Zero-Day Vulnerability Google Addresses Critical Chrome Zero-Day Vulnerability The Hacker News
April Patch Tuesday: Critical Vulnerabilities Addressed April Patch Tuesday: Critical Vulnerabilities Addressed The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark