Authentication bypass in nginx-ui via MCP-enabled API leading to remote server compromise
Summary
Hide ▲
Show ▼
A critical authentication bypass vulnerability in nginx-ui (CVE-2026-33032, CVSS 9.8) allows unauthenticated, network-adjacent attackers to gain full control of nginx servers via the MCP-enabled /mcp_message endpoint. The flaw, disclosed by Pluto Security in March 2026 and patched in version 2.3.4, stems from missing authentication middleware on an endpoint processing privileged operations such as configuration writes and server reloads. Public exposure includes over 2,600 internet-accessible instances and over 430,000 Docker image pulls, with exploitation confirmed in the wild. The issue reflects a broader pattern of AI integration endpoints (MCP) introducing security gaps, as Pluto Security also disclosed a second critical MCP-related flaw in 2026. Technical details and proof-of-concept exploits are publicly available, heightening the risk of abuse.
Timeline
-
15.04.2026 16:00 2 articles · 6h ago
Critical nginx-ui MCP authentication bypass actively exploited in the wild
Pluto Security researchers discovered CVE-2026-33032 and responsibly disclosed it to nginx-ui developers in March 2026. Technical details and proof-of-concept exploit code for the vulnerability have been publicly available, significantly increasing the risk of exploitation. The issue reflects a broader pattern noted by researchers where AI integration endpoints (MCP) expose privileged capabilities while bypassing core application security controls. Additional nginx-ui vulnerabilities disclosed in recent months include CVE-2026-27944 (unauthenticated backup data downloads) and CVE-2026-33030 (authenticated attackers accessing and modifying other users' resources).
Show sources
- Critical Nginx-ui MCP Flaw Actively Exploited in the Wild — www.infosecurity-magazine.com — 15.04.2026 16:00
- Exploited Vulnerability Exposes Nginx Servers to Hacking — www.securityweek.com — 15.04.2026 17:45
Information Snippets
-
Vulnerability CVE-2026-33032 in nginx-ui allows unauthenticated, network-adjacent attackers to execute privileged actions via the MCP-enabled /mcp_message endpoint.
First reported: 15.04.2026 16:002 sources, 2 articlesShow sources
- Critical Nginx-ui MCP Flaw Actively Exploited in the Wild — www.infosecurity-magazine.com — 15.04.2026 16:00
- Exploited Vulnerability Exposes Nginx Servers to Hacking — www.securityweek.com — 15.04.2026 17:45
-
The root cause is a missing authentication middleware on the /mcp_message endpoint, which processes MCP tool invocations including configuration writes and server restarts.
First reported: 15.04.2026 16:002 sources, 2 articlesShow sources
- Critical Nginx-ui MCP Flaw Actively Exploited in the Wild — www.infosecurity-magazine.com — 15.04.2026 16:00
- Exploited Vulnerability Exposes Nginx Servers to Hacking — www.securityweek.com — 15.04.2026 17:45
-
Exploitation enables seven destructive capabilities such as injecting nginx configurations, reloading the server to intercept traffic, and five reconnaissance actions including reading configurations and mapping backend infrastructure.
First reported: 15.04.2026 16:001 source, 1 articleShow sources
- Critical Nginx-ui MCP Flaw Actively Exploited in the Wild — www.infosecurity-magazine.com — 15.04.2026 16:00
-
Over 2,600 publicly accessible nginx-ui instances were identified via Shodan, predominantly using default port 9000, across cloud providers including Alibaba Cloud, Oracle, and Tencent.
First reported: 15.04.2026 16:002 sources, 2 articlesShow sources
- Critical Nginx-ui MCP Flaw Actively Exploited in the Wild — www.infosecurity-magazine.com — 15.04.2026 16:00
- Exploited Vulnerability Exposes Nginx Servers to Hacking — www.securityweek.com — 15.04.2026 17:45
-
The nginx-ui Docker image has been pulled more than 430,000 times, indicating a large potential exposure beyond publicly visible instances.
First reported: 15.04.2026 16:002 sources, 2 articlesShow sources
- Critical Nginx-ui MCP Flaw Actively Exploited in the Wild — www.infosecurity-magazine.com — 15.04.2026 16:00
- Exploited Vulnerability Exposes Nginx Servers to Hacking — www.securityweek.com — 15.04.2026 17:45
-
A patch was released in nginx-ui version 2.3.4 within one day of disclosure, consisting of 27 characters of added code plus a regression test.
First reported: 15.04.2026 16:001 source, 1 articleShow sources
- Critical Nginx-ui MCP Flaw Actively Exploited in the Wild — www.infosecurity-magazine.com — 15.04.2026 16:00
-
Recorded Future's Insikt Group flagged the flaw as one of 31 high-impact vulnerabilities exploited in March 2026, assigning it a risk score of 94 out of 100.
First reported: 15.04.2026 16:002 sources, 2 articlesShow sources
- Critical Nginx-ui MCP Flaw Actively Exploited in the Wild — www.infosecurity-magazine.com — 15.04.2026 16:00
- Exploited Vulnerability Exposes Nginx Servers to Hacking — www.securityweek.com — 15.04.2026 17:45
-
Pluto Security researchers discovered CVE-2026-33032 and responsibly disclosed it to nginx-ui developers in March 2026.
First reported: 15.04.2026 17:451 source, 1 articleShow sources
- Exploited Vulnerability Exposes Nginx Servers to Hacking — www.securityweek.com — 15.04.2026 17:45
-
Technical details and proof-of-concept exploit code for CVE-2026-33032 have been publicly available.
First reported: 15.04.2026 17:451 source, 1 articleShow sources
- Exploited Vulnerability Exposes Nginx Servers to Hacking — www.securityweek.com — 15.04.2026 17:45
-
CVE-2026-33032 is the second critical MCP-related vulnerability disclosed by Pluto Security in 2026, highlighting a pattern of AI integration endpoints bypassing security controls.
First reported: 15.04.2026 17:451 source, 1 articleShow sources
- Exploited Vulnerability Exposes Nginx Servers to Hacking — www.securityweek.com — 15.04.2026 17:45
-
Additional nginx-ui vulnerabilities disclosed recently include CVE-2026-27944 (unauthenticated backup data downloads) and CVE-2026-33030 (authenticated attackers accessing and modifying other users' resources).
First reported: 15.04.2026 17:451 source, 1 articleShow sources
- Exploited Vulnerability Exposes Nginx Servers to Hacking — www.securityweek.com — 15.04.2026 17:45
Similar Happenings
Langflow unauthenticated RCE vulnerability (CVE-2026-33017) exploited within 20 hours of disclosure
CISA formally confirmed active exploitation of the Langflow unauthenticated RCE vulnerability (CVE-2026-33017) on March 26, 2026, adding it to the Known Exploited Vulnerabilities (KEV) catalog and mandating U.S. federal agencies to apply mitigations or stop using the product by April 8, 2026. Threat actors exploited the flaw within 20–24 hours of its March 17, 2026 disclosure, progressing from automated scanning to staged Python payload delivery and credential harvesting (including .env and .db files) despite the absence of public PoC code. The vulnerability, with a CVSS score of 9.3, affects all Langflow versions prior to and including 1.8.1 and stems from an unsandboxed exec() call in the /api/v1/build_public_tmp/{flow_id}/flow endpoint. CISA did not attribute exploitation to ransomware actors but emphasized the risk to AI workflows given Langflow’s widespread adoption, including 145,000 GitHub stars. Endor Labs reported that attackers likely reverse-engineered exploits from the advisory details, underscoring the accelerating weaponization timeline. Mitigation guidance includes upgrading to version 1.9.0+ or disabling the vulnerable endpoint, restricting internet exposure, monitoring outbound traffic, and rotating all associated credentials.
Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
Three vulnerabilities in the mcp-server-git, maintained by Anthropic, allow file access, deletion, and code execution via prompt injection. The flaws have been addressed in versions 2025.9.25 and 2025.12.18. The vulnerabilities include path traversal and argument injection issues that can be exploited to manipulate Git repositories and execute arbitrary code. The issues were disclosed by Cyata researcher Yarden Porat, highlighting the risks of prompt injection attacks without direct system access. The vulnerabilities affect all versions of mcp-server-git released before December 8, 2025, and apply to default installations. An attacker only needs to influence what an AI assistant reads to trigger the vulnerabilities. The flaws allow attackers to execute code, delete arbitrary files, and load arbitrary files into a large language model's context. While the vulnerabilities do not directly exfiltrate data, sensitive files may still be exposed to the AI, creating downstream security and privacy risks. The vulnerabilities have been assigned CVE-2025-68143, CVE-2025-68144, and CVE-2025-68145.
Active Exploitation of Critical Adobe AEM Forms Misconfiguration
A critical misconfiguration flaw in Adobe Experience Manager (AEM) Forms on JEE versions 6.5.23.0 and earlier is under active exploitation. The flaw, CVE-2025-54253, allows arbitrary code execution via an exposed servlet. Adobe released a patch in August 2025. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. Federal agencies must apply the necessary fixes by November 5, 2025. The flaw was discovered by Adam Kues and Shubham Shah of Searchlight Cyber, who disclosed it to Adobe on April 28, 2025. The flaw is caused by an exposed /adminui/debug servlet that evaluates user-supplied OGNL expressions as Java code without authentication or input validation. This enables attackers to execute arbitrary system commands with a single crafted HTTP request. A proof-of-concept exploit is publicly available.