URL Traversal Vulnerability in Nginx UI Affects Configuration Management
CVE-2026-33027

6.9MEDIUM

Key Information:

Vendor

0xjacky

Status
Vendor
CVE Published:
30 March 2026

What is CVE-2026-33027?

The Nginx UI, an interface for managing the Nginx web server, has a vulnerability that allows authenticated users to exploit improperly handled URL-encoded traversal sequences. This can lead to unintended access to the base configuration directory (/etc/nginx), enabling users to execute destructive operations such as removing essential configuration files. This can result in service disruption and operational issues. The vulnerability was addressed in version 2.3.4, highlighting the importance of keeping server management tools updated to protect against potential attacks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

nginx-ui < 2.3.4

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.