Description
Nginx UI is a web user interface for the Nginx web server. From version 2.0.0 to before version 2.3.8, an unauthenticated network attacker can claim the initial administrator account on a fresh nginx-ui instance during the first-run setup window. The public /api/install endpoint is reachable without authentication, and the request-encryption flow only protects payload confidentiality in transit; it does not authenticate who is allowed to perform installation. A remote attacker who reaches the service before the legitimate operator can set the admin email, username, and password, causing permanent initial-instance takeover. This issue has been patched in version 2.3.8.
Published: 2026-05-04
Score: 8.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Nginx UI versions 2.0.0 up to 2.3.7 expose an /api/install endpoint that is reachable without authentication. The payload encryption protects only confidentiality, not the identity of the caller. As a result, an unauthenticated network attacker can claim the initial administrator account on a fresh instance by supplying an administrator username, email, and password. This flaw allows the attacker to permanently take full control of the application, granting them elevated privileges and full administrative access. The weakness is a lack of authentication for a privileged operation (CWE‑306).

Affected Systems

The affected vendor is 0xJacky, product Nginx UI. Any instance of Nginx UI with a version between 2.0.0 and before 2.3.8 is vulnerable. The vulnerability was patched in release 2.3.8, which removes the unauthenticated install capability and enforces authentication before claiming administrator rights.

Risk and Exploitability

The CVSS score of 8.1 reflects high severity, indicating that exploitation would provide wide-ranging system control. No EPSS score is available, so current exploitation likelihood is uncertain, though the absence of an EPSS entry does not imply low risk. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector is likely a remote network attacker who can reach the service’s web interface before the legitimate operator completes the initial setup. Such an attacker can invoke the open /api/install endpoint, claim the administrator account, and lock out the rightful operator. The risk is elevated when the service is publicly exposed or accessible over unsecured networks.

Generated by OpenCVE AI on May 4, 2026 at 21:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to nginx-ui version 2.3.8 or later to eliminate the unauthenticated install capability.
  • Restrict network access to the nginx-ui service until the initial setup is completed or block the /api/install endpoint via firewall rules.
  • Monitor the web service logs for any unauthorized /api/install requests and remediate immediately.

Generated by OpenCVE AI on May 4, 2026 at 21:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared 0xjacky
0xjacky nginx-ui
Vendors & Products 0xjacky
0xjacky nginx-ui

Mon, 04 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description Nginx UI is a web user interface for the Nginx web server. From version 2.0.0 to before version 2.3.8, an unauthenticated network attacker can claim the initial administrator account on a fresh nginx-ui instance during the first-run setup window. The public /api/install endpoint is reachable without authentication, and the request-encryption flow only protects payload confidentiality in transit; it does not authenticate who is allowed to perform installation. A remote attacker who reaches the service before the legitimate operator can set the admin email, username, and password, causing permanent initial-instance takeover. This issue has been patched in version 2.3.8.
Title nginx-ui: Unauthenticated First-Run Installer Allows Remote Initial Admin Claim
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

0xjacky Nginx-ui
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-04T20:09:37.308Z

Reserved: 2026-04-25T05:04:37.029Z

Link: CVE-2026-42221

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-04T21:16:32.023

Modified: 2026-05-04T21:16:32.023

Link: CVE-2026-42221

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T22:00:11Z

Weaknesses