Impact
Nginx UI versions 2.3.3 and earlier contain an Insecure Direct Object Reference flaw that permits any authenticated user to read, change, or delete other users' data. The vulnerability stems from missing ownership checks on resource endpoints, allowing complete authorization bypass. Attackers can take control of other users’ accounts, manipulate configurations, and potentially steal sensitive DNS API tokens or ACME private keys stored by other users.
Affected Systems
The affected product is 0xJacky’s nginx-ui, specifically all releases 2.3.3 and below.
Risk and Exploitability
The flaw receives a high severity CVSS score of 8.8, indicating substantial impact if exploited. No EPSS data is available, and it is not listed in CISA’s KEV catalog, suggesting that exploitable code has not yet been widely recorded. The attack vector is inferred to be authenticated access to the UI; an attacker must first log in to the web interface to trigger the bypass. Once authenticated, the attacker can perform unauthorized CRUD operations on any resource.
OpenCVE Enrichment
Github GHSA