Back to Feed
VulnerabilitiesApr 15, 2026

Exploited Vulnerability Exposes Nginx Servers to Hacking

Critical Nginx UI vulnerability CVE-2026-33032 exploited in wild to takeover servers.

Summary

A critical remote code execution vulnerability (CVE-2026-33032) in Nginx UI, a web-based management interface for Nginx servers, is being actively exploited in the wild. The flaw stems from insecure AI (MCP) integration that bypasses security controls, and Pluto Security identified over 2,600 internet-exposed instances. Attackers can achieve unauthenticated full server takeover, with exploitation details and PoC code publicly available.

Full text

A critical Nginx UI vulnerability that allows attackers to take full control of servers has been exploited in the wild. Nginx UI (nginx-ui) is a web-based management interface for the Nginx web server. It has 11,000 stars on GitHub and it may be used to manage hundreds of thousands of deployments. The software is affected by a vulnerability tracked as CVE-2026-33032, which was patched recently in version 2.3.4. The issue relates to Nginx UI’s recently added AI (MCP) integration. Pluto Security, whose researchers discovered and responsibly disclosed the vulnerability to Nginx UI developers in March, reported finding more than 2,600 internet-exposed instances. The security firm showed how an unauthenticated attacker can exploit the vulnerability using specially crafted requests to take over Nginx servers. Technical details and PoC exploit code have been publicly available. Advertisement. Scroll to continue reading. Threat intelligence firm Recorded Future reported recently that CVE-2026-33032 was one of the 31 high-impact vulnerabilities it observed being exploited in the wild in March 2026. However, there appears to be no public information about the nature of these attacks. In theory, a threat actor can exploit the vulnerability to intercept traffic, deploy backdoors or malicious redirects, cause disruption, and steal sensitive information. “This is the second critical MCP vulnerability we’ve disclosed this year, with many more in coordinated disclosure,” said Yotam Perkal, director of security research at Pluto. “The pattern is consistent — AI integration endpoints expose the same capabilities as the core application but often skip its security controls.” CVE-2026-33032 is not the only Nginx UI vulnerability disclosed in recent months. Users have also been warned about CVE-2026-27944, which can be exploited for unauthenticated backup data downloads, and CVE-2026-33030, which allows authenticated attackers to access, modify, and delete other users’ resources. Related: ‘By Design’ Flaw in MCP Could Enable Widespread AI Supply Chain Attacks Related: Two Vulnerabilities Patched in Ivanti Neurons for ITSM Related: Fortinet Patches Critical FortiSandbox Vulnerabilities Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs ICS Patch Tuesday: 8 Industrial Giants Publish New Security AdvisoriesMicrosoft Patches Exploited SharePoint Zero-Day and 160 Other VulnerabilitiesAdobe Patches 55 Vulnerabilities Across 11 ProductsEurope’s Largest Gym Chain Says Data Breach Impacts 1 Million MembersNightclub Giant RCI Hospitality Reports Data BreachBooking.com Says Hackers Accessed User InformationOpenAI Impacted by North Korea-Linked Axios Supply Chain HackInternational Operation Targets Multimillion-Dollar Crypto Theft Schemes Latest News Capsule Security Emerges From Stealth With $7 Million in Funding‘By Design’ Flaw in MCP Could Enable Widespread AI Supply Chain Attacks100 Chrome Extensions Steal User Data, Create BackdoorCISO Conversations: Ross McKerchar, CISO at SophosMirax RAT Targeting Android Users in EuropeTwo Vulnerabilities Patched in Ivanti Neurons for ITSM $10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov NetworksTrump Urges Extending Foreign Surveillance Program as Some Lawmakers Push for US Privacy Protections Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: A Step-by-Step Approach to AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveThe United States Department of War appointed David Vaughn as Technical Advisor for Data Infrastructure.Black Duck has named Dom Glavach as Chief Information Security Officer.Finite State has named Ann Miller as Vice President of Marketing.More People On The MoveExpert Insights The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) The Human IOC: Why Security Professionals Struggle with Social Vetting Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email

Indicators of Compromise

  • cve — CVE-2026-33032
  • cve — CVE-2026-27944
  • cve — CVE-2026-33030

Entities

Nginx UI (product)Nginx (product)Nginx (vendor)Pluto Security (vendor)Recorded Future (vendor)MCP (Model Context Protocol) (technology)