Critical security vulnerability in Nginx UI closed again

Important security updates close multiple vulnerabilities in the web UI for nginx web servers Nginx UI. Attackers can take over instances.

listen Print view
Ball with a lock inside in front of a skyline

(Image: VideoFlow/Shutterstock.com)

2 min. read

Admins who use the Nginx UI web interface for their nginx-based web servers should update the software promptly. If they don't, attackers can exploit multiple security vulnerabilities and, in the worst case, completely compromise systems.

One vulnerability (CVE-2026-42238) is considered “critical.” Because backup restore points are accessible without authentication for ten minutes during every new installation and restart, remote attackers can upload manipulated backups. They can overwrite the configuration file app.ini with their commands and gain full control over instances.

By successfully exploiting another vulnerability (CVE-2026-42221 “high”), attackers can hijack admin accounts during the initial setup. This is said to be possible without authentication.

Videos by heise

The remaining vulnerabilities can be used, among other things, to leak actually secret data (CVE-2026-42223 “medium”). The developers assure that the security problems have been resolved in Nginx UI 2.3.8. So far, there are no indications from the software manufacturer that attackers are already exploiting the vulnerabilities. However, admins should not delay patching for too long. Further information on the security vulnerabilities and how attacks could occur can be found by admins in the warning messages linked below this report.

The developers recently closed critical vulnerabilities in the web management tool.

The list of vulnerabilities, sorted by threat level in descending order:

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.