CTI Swarm
Zurück zu allen Deep Dives
RAPID7 CYBERSECURITY BLOG

CVE-2026-33032: Nginx UI Missing MCP Authentication

Strategische Zusammenfassung

Describes a missing authentication mechanism in Nginx UI that could allow unauthorized access.

Volltext

Title: CVE-2026-33032: Nginx UI Missing MCP Authentication

URL Source: https://www.rapid7.com/blog/post/etr-cve-2026-33032-nginx-ui-missing-mcp-authentication

Published Time: 2026-04-16T19:52:13.018Z

Markdown Content: # CVE-2026-33032: Nginx UI Missing MCP Authentication

![Image 1: icon_orange_calendar.svg](https://www.rapid7.com/cdn/images/blt152a0789bd25a955/679c9ed273a8d998a9a938b5/icon_orange_calendar.svg)

Rapid7’s 2026 Global Cybersecurity Summit returns May 12-13![Secure your spot.](https://www.rapid7.com/about/events-webcasts/global-cybersecurity-summit-2026/)

[![Image 2: Rapid7](https://www.rapid7.com/_next/static/media/rapid7-logo.0wr-9470i7grz.svg)](https://www.rapid7.com/)

* Platform * Services * Resources * Partners * Company

[](https://www.rapid7.com/contact/)[](https://insight.rapid7.com/saml/SSO)[Request Demo](https://www.rapid7.com/request-demo/)

[Back to Blog](https://www.rapid7.com/blog/)

Vulnerabilities and Exploits # CVE-2026-33032: Nginx UI Missing MCP Authentication

[![Image 3: Rapid7](https://www.rapid7.com/rapid7-author-image.svg) Rapid7](https://www.rapid7.com/blog/author/rapid7/)

Apr 16, 2026|Last updated on Apr 16, 2026|2 min read

[DISCOVER RAPID7 MDR](https://www.rapid7.com/services/managed-detection-and-response-mdr/)

![Image 4: CVE-2026-33032: Nginx UI Missing MCP Authentication](https://www.rapid7.com/_next/image/?url=https%3A%2F%2Fwww.rapid7.com%2Fcdn%2Fimages%2Fblt65a432ba319f4043%2F6846abddaf18306debe6cf4d%2FETR.webp&w=3840&q=75)

## Table of contents

* Overview * Mitigation guidance * Rapid7 customers * Updates

## Overview

On March 30, 2026, a security advisory was [published](https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h6c2-x2m2-mwhf) for a critical vulnerability affecting [Nginx UI](https://github.com/0xJacky/nginx-ui). Nginx UI is an open-source web interface to centralize the management of Nginx configurations and SSL certificates. The critical vulnerability, [CVE-2026-33032](https://nvd.nist.gov/vuln/detail/CVE-2026-33032), was reported in early March by Pluto Security researcher Yotam Perkal and [subsequently patched](https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/#Timeline) on March 15, 2026. That same day, Pluto Security [published](https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/) a technical blog post with some vulnerability details.

CVE-2026-33032 is a missing authentication bug with a CVSS score of [9.8](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H); as a result of missing authentication controls, an unauthenticated attacker can access a [Model Context Protocol (MCP)](https://modelcontextprotocol.io/docs/getting-started/intro) server that can perform privileged operations on managed Nginx web servers. Systems are vulnerable in the default IP allowlist configuration, which allows any remote IP to access MCP functionality. Exploitation results in full attacker control of the managed Nginx service.

According to a Recorded Future [report](https://www.recordedfuture.com/blog/march-2026-cve-landscape) published on April 13, 2026, exploitation of CVE-2026-33032 in the wild has begun.

## Mitigation guidance

Organizations running Nginx UI should prioritize updating on an urgent basis to remediate CVE-2026-33032. Additionally, to reduce exposure to future vulnerabilities affecting Nginx UI, defenders should ensure that network access to the Nginx UI management interface is strictly limited to those who must have it.

### Affected versions:

According to the [finder’s blog post](https://pluto.secur […]

[… 6,446 Zeichen — nächste Zone: keyword-dense paragraphs …]

[![Image 10: FortiGate CVE-2025-59718 Exploitation: Incident Response Findings](https://www.rapid7.com/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblted8cb9466d79dc4d%2F6852c596a274324cfbb23d9d%2FPSN-gov-showcase-hero-image.png%3Fauto%3Davif&w=1920&q=75) Vulnerabilities and Exploits ### FortiGate CVE-2025-59718 Exploitation: Incident Response Findings ![Image 11: Rapid7 Labs's avatar](https://www.rapid7.com/default-author-image.svg) ![Image 12: Rapid7 Labs's avatar](https://www.rapid7.com/default-author-image.svg) Eric Carey, Olivia Henderson +1](https://www.rapid7.com/blog/post/ve-fortigate-cve-2025-59718-exploitation-incident-response-ir-findings/)[![Image 13: The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report](https://www.rapid7.com/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fbltb5f320e7f08dcc1c%2F69b94e70daccab6b3b0b91ca%2Fcard-threat-landscape-report-2026.webp%3Fauto%3Davif&w=1920&q=75) Threat Research ### The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report ![Image 14: Rapid7 Labs's avatar](https://www.rapid7.com/default-author-image.svg) Rapid7 Labs](https://www.rapid7.com/blog/post/tr-accelerating-attack-cycle-2026-global-threat-landscape-report/)[![Image 15: Introducing Hacktics and Telemetry, a Podcast from Rapid7 Labs](https://www.rapid7.com/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fbltaeea2cc0c4ea9941%2F69b2b00eccd72932658ae9a4%2Fhero-image.jpg%3Fauto%3Davif&w=1920&q=75) Threat Research ### Introducing Hacktics and Telemetry, a Podcast from Rapid7 Labs ![Image 16: Douglas McKee, Director, Vulnerability Intelligence's avatar](https://www.rapid7.com/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fbltc1e6d40e8f97f662%2F690bb3f7e56f9652015a023b%2FDouglas_McKee_Charcoal_Pattern.jpg&w=64&q=75) Douglas McKee, Director, Vulnerability Intelligence](https://www.rapid7.com/blog/post/tr-introducing-hacktics-telemetry-podcast-rapid7-labs/)[![Image 17: Critical Cisco Catalyst Vulnerability Exploited in the wild […]

[![Image 20: LinkedIn icon](https://www.rapid7.com/icons/footer/icon-linkedin.svg) LinkedIn](https://www.linkedin.com/company/39624)[![Image 21: X (Twitter) […]

[Legal Terms](https://ww […]

[… 5,678 Zeichen — nächste Zone: tail …]

Cookies Details

#### Targeting Cookies

- [x] Targeting Cookies

These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Cookies Details

#### Performance Cookies

- [x] Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.

Cookies Details

#### Functional Cookies

- [x] Functional Cookies

These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.

Cookies Details

### Cookie List

Clear

* - [x] checkbox label label

Apply Cancel

Consent Leg.Interest

- [x] checkbox label label

- [x] checkbox label label

- [x] checkbox label label

Reject All Confirm My Choices

[![Image 27: Powered by Onetrust](https://cdn.cookielaw.org/logos/static/powered_by_logo.svg)](https://www.onetrust.com/products/cookie-consent/)