Nginx UI < 2.3.5 Unauthenticated MCP Endpoint

critical Web App Scanning Plugin ID 115212

Synopsis

Nginx UI < 2.3.5 Unauthenticated MCP Endpoint

Description

Nginx UI version below 2.3.5 contains an unauthenticated access vulnerability in the MCP (Model Context Protocol) integration. The /mcp_message endpoint is protected only by IP whitelisting, and the default configuration allows all IPs, enabling attackers to execute critical actions such as restarting nginx, modifying configuration files, and triggering automatic reloads without authentication.

Solution

Upgrade to Nginx UI version 2.3.5 or later.

See Also

https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h6c2-x2m2-mwhf

Plugin Details

Severity: Critical

ID: 115212

Type: Version Based

Published: 4/3/2026

Updated: 4/3/2026

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-33032

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2026-33032

Vulnerability Information

CPE: cpe:2.3:a:nginxui:nginx_ui:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/15/2026

Vulnerability Publication Date: 3/29/2026

Reference Information

CVE: CVE-2026-33032