Impact
An unauthenticated bootstrap takeover vulnerability exists in nginx-ui version 2.3.5 where an attacker can send a POST request to /api/install during the initial installation window and claim the instance. The vulnerability allows the attacker to control the deployment process and configure the service under their own settings, potentially compromising the confidentiality, integrity, and availability of the system. The weakness is rooted in missing access control (CWE‑284) and lack of authentication (CWE‑306).
Affected Systems
The affected product is nginx-ui from 0xJacky, specifically version 2.3.5. No other versions were listed as affected in the advisory.
Risk and Exploitability
With a CVSS score of 8.1, the vulnerability is considered high severity. EPSS information is not available, and the issue is not listed in the CISA KEV catalog. The likely attack vector is an unauthenticated HTTP POST to /api/install performed during the instance’s first‑boot installation period, inferred from the description of the bootstrap takeover.
OpenCVE Enrichment