Vulnerability in Nginx UI Backup Restore Mechanism
CVE-2026-33026

9.4CRITICAL

Key Information:

Vendor

0xjacky

Status
Vendor
CVE Published:
30 March 2026

What is CVE-2026-33026?

CVE-2026-33026 represents a security vulnerability found in the Nginx UI, a web-based interface designed to simplify the management of the Nginx web server. Nginx is a highly popular server used for hosting web applications, handling complex web traffic, and providing excellent performance. The vulnerability pertains to the backup restore mechanism present in versions prior to 2.3.4. Specifically, it allows malicious actors to manipulate encrypted backup archives, injecting harmful configuration changes during the restoration process.

This flaw can lead to severe operational disruptions, as compromised configurations can alter server behaviors, create unauthorized access points, or leak sensitive data. Organizations utilizing Nginx UI are particularly at risk, as the vulnerability has the potential to undermine the security posture of their web applications, potentially exposing them to further attacks.

Potential Impact of CVE-2026-33026

  1. Unauthorized Configuration Changes: Attackers can exploit this vulnerability to alter the server's settings, potentially redirecting traffic, disabling security features, or making the server vulnerable to additional exploitations.

  2. Data Integrity Risks: The injection of malicious configurations could compromise the integrity of web applications and stored data, leading to unauthorized disclosures or corruption of sensitive information.

  3. Operational Downtime and Recovery Costs: Organizations may experience significant downtime as a result of exploiting this vulnerability, necessitating time-consuming recovery efforts, restoration from clean backups, and potential financial losses associated with disrupted operations and eroded customer trust.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

nginx-ui < 2.3.4

References

CVSS V4

Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.