{"id":45443,"date":"2026-04-15T22:35:02","date_gmt":"2026-04-15T14:35:02","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/critical-nginx-ui-mcp-flaw-actively-exploited-in-the-wild-infosecurity-magazine\/"},"modified":"2026-04-15T22:35:02","modified_gmt":"2026-04-15T14:35:02","slug":"critical-nginx-ui-mcp-flaw-actively-exploited-in-the-wild-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/critical-nginx-ui-mcp-flaw-actively-exploited-in-the-wild-infosecurity-magazine\/","title":{"rendered":"Critical Nginx-ui MCP Flaw Actively Exploited in the Wild &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>A critical authentication bypass in nginx-ui, a widely used open-source web interface for managing nginx servers, has been actively exploited in the wild.<\/p>\n<p>The vulnerability, tracked as CVE-2026-33032 with a CVSS score of 9.8, was discovered by Pluto Security and allows any network-adjacent attacker to take full control of an nginx server through a single unauthenticated API request.<\/p>\n<p>VulnCheck has added the flaw to its Known Exploited Vulnerabilities (KEV) list. Recorded Future&#39;s Insikt Group independently flagged it in a<a href=\"https:\/\/www.recordedfuture.com\/blog\/march-2026-cve-landscape\" style=\"text-decoration:none;\" target=\"_blank\"> recent report<\/a> as one of 31 high-impact vulnerabilities exploited during March 2026, assigning it a risk score of 94 out of 100.<\/p>\n<h2><strong>Missing Middleware, Full Access<\/strong><\/h2>\n<p>The root cause comes down to a single missing function call: nginx-ui recently added support for the Model Context Protocol (MCP), which splits communication across two HTTP endpoints.<\/p>\n<p>The \/mcp endpoint, used for establishing connections, carries both IP whitelisting and authentication middleware. But \/mcp_message, the endpoint that processes every tool invocation including configuration writes and server restarts, shipped without the authentication check.<\/p>\n<p>That omission exposes 12 MCP tools to unauthenticated callers. Seven are destructive, enabling attackers to inject nginx configurations, reload the server and intercept all traffic passing through it. The remaining five provide reconnaissance capabilities such as reading existing configs and mapping backend infrastructure.<\/p>\n<p><em><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/mcp-servers-risk-rce-data-leaks\/\" style=\"text-decoration:none;\" target=\"_blank\">Read more on MCP-focussed attacks: Hundreds of MCP Servers at Risk of RCE and Data Leaks<\/a><\/em><\/p>\n<h2><strong>Thousands of Instances at Risk<\/strong><\/h2>\n<p>Pluto Security&#39;s researchers said they used <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/future-thinking\/what-is-offensive-cybersecurity.html\" target=\"_self\">Shodan<\/a> to identify over 2,600 publicly reachable nginx-ui instances across cloud providers including Alibaba Cloud, Oracle and Tencent.<\/p>\n<p>Most were running on the default port 9000. The tool&#39;s Docker image has been pulled more than 430,000 times, suggesting a much larger population of potentially vulnerable deployments sitting behind firewalls.<\/p>\n<p>The nginx-ui maintainers released a patch in version 2.3.4 just one day after disclosure. The fix amounted to 27 characters of added code, along with a regression test to prevent the same oversight from recurring. Organizations running nginx-ui with MCP enabled should take immediate action:<\/p>\n<ul>\n<li>\n<p>Update to version 2.3.4 or later<\/p>\n<\/li>\n<li>\n<p>If patching is not possible, disable MCP functionality entirely<\/p>\n<\/li>\n<li>\n<p>Restrict network access to the management interface<\/p>\n<\/li>\n<li>\n<p>Review server logs and configuration directories for unauthorized changes<\/p>\n<\/li>\n<\/ul>\n<p>This is the second MCP vulnerability Pluto Security has disclosed in recent weeks, following MCPwnfluence, an SSRF-to-RCE chain in the Atlassian MCP server.<\/p>\n<p>Both cases expose a recurring weakness: when MCP is connected to existing applications, its endpoints often inherit full capabilities without inheriting any of the security controls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A critical authentication bypass in nginx-ui, a widely  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-45443","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45443"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45443\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}