A critical, unauthenticated remote code execution vulnerability in nginx-ui, a popular open-source web interface for managing Nginx, is being actively exploited. The vulnerability, tracked as CVE-2026-33032 and assigned a CVSS score of 9.8, allows a remote attacker to completely bypass authentication and execute arbitrary commands on the server. The flaw, discovered by Pluto Security and dubbed "MCPwn," resides in an improperly secured API endpoint. Attackers can leverage this to modify Nginx configurations, potentially to intercept traffic, serve malicious content, or gain a persistent foothold on the server. The vulnerability was patched in version 2.3.4, and all users of earlier versions are at immediate risk and should update without delay.
CVE-2026-33032/mcp and /mcp_message. While /mcp is correctly authenticated, the /mcp_message endpoint's security relied solely on an IP whitelist. The default configuration for this whitelist is empty, which the application's middleware incorrectly interprets as 'allow all traffic'. This leaves the endpoint completely exposed to any network attacker.An attacker can exploit this flaw with two simple HTTP requests:
GET request to the authenticated /mcp endpoint. Even though it fails, the server helpfully establishes a session and returns a session ID.POST request to the unprotected /mcp_message endpoint, including the session ID obtained in step 1. This allows the attacker to invoke any MCP tool function without authentication.Successful exploitation of CVE-2026-33032 grants an attacker complete administrative control over the managed Nginx instance. This can lead to severe consequences:
Given the ease of exploitation and the critical impact, any internet-facing, unpatched instance of nginx-ui should be considered compromised.
Security teams can hunt for exploitation by reviewing Nginx access logs for the following patterns:
/mcp or /mcp_message endpoints from unknown or untrusted IP addresses.GET request to /mcp immediately followed by a POST to /mcp_message from the same IP address.nginx.conf and included files), followed by a service reload.grep or a SIEM to search web server access logs for requests to the vulnerable endpoints:grep -E "/mcp|/mcp_message" /var/log/nginx/access.log
Updating nginx-ui to the patched version (2.3.4+) is the only way to fully remediate the vulnerability.
Restricting network access to the nginx-ui administrative interface to a trusted set of IPs is a critical defense-in-depth measure.
The primary and most urgent countermeasure for CVE-2026-33032 is to update all instances of nginx-ui to version 2.3.4 or later. Given that this vulnerability is critical (CVSS 9.8) and under active exploitation, this should be treated as an emergency patch. Organizations should use their asset inventory systems to identify all servers running nginx-ui and deploy the update immediately. For internet-facing systems, this patch should be applied within hours, not days. After patching, it is crucial to verify the update was successful and review logs for any signs of compromise that may have occurred before the patch was applied.
As a fundamental security best practice and a crucial compensating control, the nginx-ui administrative interface should never be exposed to the public internet. Organizations must implement inbound traffic filtering using firewalls or cloud security groups to restrict access to the interface. Access should be limited to specific, trusted IP addresses or internal network ranges, such as a dedicated management network or a corporate VPN. This D3FEND technique would have prevented external attackers from reaching the vulnerable /mcp_message endpoint in the first place, effectively neutralizing the threat even on an unpatched system. This control should remain in place even after patching as a defense-in-depth measure.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats