Description
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.3, the /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the X-Backup-Security response header. This allows an unauthenticated attacker to download a full system backup containing sensitive data (user credentials, session tokens, SSL private keys, Nginx configurations) and decrypt it immediately. This issue has been patched in version 2.3.3.
Published: 2026-03-05
Score: 9.8 Critical
EPSS: 6.8% Low
KEV: No
Impact: Sensitive Data Exposure
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the Nginx UI web interface, where the /api/backup endpoint is reachable without any authentication. When accessed, the service returns a backup file along with the encryption key in the X-Backup-Security response header. This combination of an unauthenticated download and disclosure of the key satisfies the weaknesses of missing authentication for a critical function (CWE‑306) and missing encryption in transmission (CWE‑311). The effect is that an attacker can obtain a complete backup containing user credentials, session tokens, SSL private keys, and server configurations, and decrypt it immediately, compromising confidentiality and potentially leading to further compromise of the host or other systems.

Affected Systems

The affected product is Nginx UI, developed by 0xJacky, versions earlier than 2.3.3. The vulnerability impacts any deployment of this web interface regardless of the underlying Nginx server version. Specific vendors or integrations are not listed beyond the primary product.

Risk and Exploitability

The CVSS base score of 9.8 indicates critical severity, and the EPSS score of 7% shows that a non‑negligible portion of incidents may target this flaw. The vulnerability is not yet listed in the CISA Known Exploited Vulnerabilities catalog. Attackers can exploit the flaw remotely with a simple HTTP GET request to /api/backup on any publicly accessible or internal instance that has not been patched. No special privileges are required, and the process requires no user interaction. Once the backup and key are acquired, the attacker can decrypt the backup file straight away. The requirement of a publicly reachable Nginx UI instance and a pre‑2.3.3 version are the only known prerequisites.

Generated by OpenCVE AI on April 21, 2026 at 23:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Nginx UI to version 2.3.3 or later, which removes the unauthenticated endpoint and encrypts the key properly.
  • If an upgrade cannot be applied immediately, block access to the /api/backup URL with firewall rules or remove the backup endpoint from the application to prevent unauthorized use.
  • Ensure that backup files are accessible only to authenticated administrators and that backup data is encrypted in transit and at rest, limiting exposure even if an attacker manages to bypass the protection.

Generated by OpenCVE AI on April 21, 2026 at 23:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g9w5-qffc-6762 Nginx-UI Vulnerable to Unauthenticated Backup Download with Encryption Key Disclosure
History

Thu, 19 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Nginxui
Nginxui nginx Ui
CPEs cpe:2.3:a:nginxui:nginx_ui:*:*:*:*:*:*:*:*
Vendors & Products Nginxui
Nginxui nginx Ui

Fri, 06 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared 0xjacky
0xjacky nginx-ui
Vendors & Products 0xjacky
0xjacky nginx-ui

Thu, 05 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.3, the /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the X-Backup-Security response header. This allows an unauthenticated attacker to download a full system backup containing sensitive data (user credentials, session tokens, SSL private keys, Nginx configurations) and decrypt it immediately. This issue has been patched in version 2.3.3.
Title Nginx UI: Unauthenticated Backup Download with Encryption Key Disclosure
Weaknesses CWE-306
CWE-311
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

0xjacky Nginx-ui
Nginxui Nginx Ui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-19T14:49:05.173Z

Reserved: 2026-02-25T03:11:36.690Z

Link: CVE-2026-27944

cve-icon Vulnrichment

Updated: 2026-03-06T16:01:37.626Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T19:16:05.840

Modified: 2026-03-10T18:11:27.450

Link: CVE-2026-27944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T23:45:02Z

Weaknesses