Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42238— Unauthenticated Remote Code Execution via Backup Restore in nginx-ui

EPSS 0.32% · P55
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42238

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Unauthenticated Remote Code Execution via Backup Restore in nginx-ui
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, nginx-ui exposes a backup restore endpoint (POST /api/restore) that is completely unauthenticated during the first 10 minutes after process startup on any fresh installation. An unauthenticated remote attacker can upload a crafted backup archive that overwrites the application's configuration file (app.ini) and SQLite database. Because the attacker controls the restored app.ini, they can inject an arbitrary OS command into the TestConfigCmd setting. After the application automatically restarts to apply the restored config, a single follow-up request triggers that command as the user running nginx-ui — typically root in Docker deployments. This issue has been patched in version 2.3.8.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nginx UI 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nginx UI是Jacky个人开发者的一个 Nginx 的 WebUI。 Nginx UI 2.3.8之前版本存在代码注入漏洞,该漏洞源于备份恢复端点POST /api/restore在进程启动后前10分钟内完全未经身份验证,可能导致未经身份验证的远程攻击者上传特制备份存档覆盖配置文件app.ini和SQLite数据库,注入任意OS命令至TestConfigCmd设置,并在应用自动重启后触发命令执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
0xJackynginx-ui < 2.3.8 -

II. Public POCs for CVE-2026-42238

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42238

登录查看更多情报信息。

Same Patch Batch · 0xJacky · 2026-05-04 · 5 CVEs total

CVE-2026-422228.1 HIGHnginx-ui: Unauthenticated first-boot instance claim via POST /api/install allows remote bo
CVE-2026-422218.1 HIGHnginx-ui: Unauthenticated First-Run Installer Allows Remote Initial Admin Claim
CVE-2026-422206.5 MEDIUMnginx-ui: Authenticated settings disclosure exposes node.secret and enables trusted-node a
CVE-2026-422236.5 MEDIUMnginx-ui: Settings API Exposes Protected Secrets

IV. Related Vulnerabilities

V. Comments for CVE-2026-42238

No comments yet


Leave a comment