Cyber Posture

CVE-2026-34403

HighPublic PoC

Published: 20 April 2026

Published
20 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
EPSS Score 0.0003 8.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34403 is a high-severity Missing Origin Validation in WebSockets (CWE-1385) vulnerability in Nginxui Nginx Ui. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 8.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates secure configuration settings for WebSocket origin validation and authentication cookies with HttpOnly and SameSite attributes to prevent cross-site WebSocket hijacking.

prevent

Requires validation of Origin headers during WebSocket upgrades to block connections from untrusted cross-site origins, directly addressing the unconditional CheckOrigin flaw.

prevent

Ensures proper management and protection of authentication tokens in cookies to mitigate cross-site access by requiring secure storage attributes like HttpOnly and SameSite.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CSWSH vulnerability in the public-facing Nginx UI web application directly enables exploitation of the app to perform unauthorized admin actions via hijacked authenticated WebSocket sessions.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.5, all WebSocket endpoints in nginx-ui use a gorilla/websocket Upgrader with CheckOrigin unconditionally returning true, allowing Cross-Site WebSocket Hijacking (CSWSH). Combined with the fact that…

more

authentication tokens are stored in browser cookies (set via JavaScript without HttpOnly or explicit SameSite attributes), a malicious webpage can establish authenticated WebSocket connections to the nginx-ui instance when a logged-in administrator visits the attacker-controlled page. Version 2.3.5 patches the issue.

Deeper analysisAI

CVE-2026-34403 is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability, tracked under CWE-1385, affecting Nginx UI, a web user interface for the Nginx web server. In versions prior to 2.3.5, all WebSocket endpoints utilize a gorilla/websocket Upgrader where the CheckOrigin function unconditionally returns true, bypassing origin validation. This issue is exacerbated by authentication tokens stored in browser cookies set via JavaScript, lacking HttpOnly or explicit SameSite attributes, enabling cross-site access to these tokens. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N).

An attacker can exploit this vulnerability by luring a logged-in administrator to visit an attacker-controlled webpage. The malicious page can then establish authenticated WebSocket connections to the nginx-ui instance, leveraging the victim's cookies for authentication. This allows the attacker to perform actions on behalf of the administrator over the hijacked WebSocket, potentially compromising confidentiality and integrity of the nginx-ui configuration and related Nginx server management.

The GitHub security advisory (GHSA-78mf-482w-62qj) and release notes for version 2.3.5 detail the patch, which addresses the CheckOrigin misconfiguration and cookie handling deficiencies. Security practitioners should upgrade to nginx-ui version 2.3.5 or later to mitigate the issue, and review WebSocket implementations for similar origin validation flaws.

Details

CWE(s)

Affected Products

nginxui
nginx ui
≤ 2.3.5

CVEs Like This One

CVE-2026-42222Same product: Nginxui Nginx Ui
CVE-2026-42221Same product: Nginxui Nginx Ui
CVE-2026-33026Same product: Nginxui Nginx Ui
CVE-2026-27944Same product: Nginxui Nginx Ui
CVE-2026-33032Same product: Nginxui Nginx Ui
CVE-2026-33031Same product: Nginxui Nginx Ui
CVE-2026-33030Same product: Nginxui Nginx Ui
CVE-2026-42238Same product: Nginxui Nginx Ui
CVE-2026-33028Same product: Nginxui Nginx Ui
CVE-2024-48849Shared CWE-1385

References