Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

Summary

A critical vulnerability, CVE-2026-33032, affecting the nginx-ui management tool is being actively exploited. This authentication bypass flaw allows attackers to gain full control of the Nginx server. The vulnerability has been nicknamed MCPwn by Pluto Security.

IFF Assessment

FOE

The active exploitation of a critical vulnerability that allows for full server takeover is detrimental to defenders.

Severity

9.8 Critical

A CVSS score of 9.8 indicates a critical severity, reflecting the potential for an attacker to gain complete control of the Nginx server through an authentication bypass, with high exploitability.

Defender Context

Defenders need to prioritize patching or mitigating the CVE-2026-33032 vulnerability in nginx-ui to prevent unauthorized access and server compromise. Monitoring for signs of exploitation, such as unusual Nginx activity or unauthorized configuration changes, is also crucial.

Read Full Story →