Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-33030— Nginx UI: Unencrypted Storage of DNS API Tokens and ACME Private Keys

CVSS 8.8 · High EPSS 0.04% · P12
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-33030

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Nginx UI: Unencrypted Storage of DNS API Tokens and ACME Private Keys
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nginx UI is a web user interface for the Nginx web server. In versions 2.3.3 and prior, Nginx-UI contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated user to access, modify, and delete resources belonging to other users. The application's base Model struct lacks a user_id field, and all resource endpoints perform queries by ID without verifying user ownership, enabling complete authorization bypass in multi-user environments. At time of publication, there are no publicly available patches.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nginx UI 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nginx UI是Jacky个人开发者的一个 Nginx 的 WebUI。 Nginx UI 2.3.3及之前版本存在安全漏洞,该漏洞源于存在不安全的直接对象引用,允许任何经过身份验证的用户访问、修改和删除其他用户的资源。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
0xJackynginx-ui <= 2.3.3 -

II. Public POCs for CVE-2026-33030

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-33030

登录查看更多情报信息。

Same Patch Batch · 0xJacky · 2026-03-30 · 6 CVEs total

CVE-2026-330329.8 CRITICALNginx UI: Unauthenticated MCP Endpoint Allows Remote Nginx Takeover
CVE-2026-33028Nginx UI: Race Condition Leads to Persistent Data Corruption and Service Collapse
CVE-2026-33029Nginx UI: DoS via Negative Integer Input in Logrotate Interval
CVE-2026-33026nginx-ui Backup Restore Allows Tampering with Encrypted Backups
CVE-2026-33027Nginx UI: Improper Path Validation Allows Recursive Deletion of the Nginx Configuration Di

IV. Related Vulnerabilities

V. Comments for CVE-2026-33030

No comments yet


Leave a comment