Serialization Flaw in Nginx UI Exposes Sensitive Data
CVE-2026-42223

6.5MEDIUM

Key Information:

Vendor

0xjacky

Status
Vendor
CVE Published:
4 May 2026

What is CVE-2026-42223?

The Nginx UI, a web interface for managing Nginx servers, contains a serious vulnerability in its GetSettings API handler. This issue allows authenticated users to access sensitive configuration settings that should be protected. Although certain fields are tagged as protected during write operations, this protection does not extend to read operations. Consequently, critical fields such as JwtSecret, NodeSecret, and OIDC ClientSecret can be exposed, leading to potential authorization token forgery, cluster node impersonation, and OAuth account takeovers. This vulnerability has been addressed in Nginx UI version 2.3.8.

Affected Version(s)

nginx-ui < 2.3.8

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.