Cyber Posture

CVE-2026-33032

CriticalPublic PoC

Published: 30 March 2026

Published
30 March 2026
Modified
16 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1005 93.1th percentile
Risk Priority 26 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2026-33032 is a critical authentication bypass vulnerability in Nginx UI, a web user interface for the Nginx web server, affecting versions 2.3.5 and prior. The issue stems from the MCP (Model Context Protocol) integration, which exposes two HTTP endpoints: /mcp and /mcp_message. The /mcp endpoint enforces both IP whitelisting and authentication via AuthRequired() middleware, but /mcp_message applies only IP whitelisting. With an empty default whitelist interpreted by the middleware as "allow all," the endpoint lacks authentication entirely.

Any network-accessible attacker can exploit this vulnerability without privileges or user interaction to invoke all MCP tools. This grants capabilities such as restarting Nginx, creating, modifying, or deleting Nginx configuration files, and triggering automatic configuration reloads, enabling complete takeover of the Nginx service. The flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-306 (Missing Authentication for Critical Function).

Advisories, including the GitHub security advisory GHSA-h6c2-x2m2-mwhf and analysis on websec.net, confirm no publicly available patches exist as of the CVE's publication on 2026-03-30T18:16:19.410. The MCP integration's exposure highlights risks in AI/ML-related deployments using Nginx UI for model context protocol handling.

Details

CWE(s)
CWE-306

Affected Products

nginxui
nginx ui
≤ 2.3.5

AI Security Analysis

AI Category
AI Agent Protocols and Integrations
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: mcp, model context protocol, mcp, mcp, mcp

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a critical authentication bypass in the public-facing Nginx UI web interface, enabling unauthenticated remote attackers to invoke MCP tools for full Nginx service control (restart, config create/modify/delete/reload), directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References