Latest Nginx UI vulnerability: CVE-2026-27944 #

Nginx UI disclosed that certain versions of Nginx UI are affected by a vulnerability that allows for unauthenticated backup data downloads and the disclosure of associated encryption keys. This flaw stems from missing authentication on the /api/backup endpoint. Additionally, the AES-256 encryption key and IV (Initialization Vector) required to decrypt the backup are transmitted in plaintext within the X-Backup-Security response header. The vulnerability has been designated CVE-2026-27944 and has been rated critical with a CVSS score of 9.8.

      The following versions are affected

      • Nginx UI all versions prior to 2.3.3

      What is Nginx UI? #

      Nginx UI is a web-based graphical interface used to manage Nginx server configurations, SSL certificates, and system logs without manual command-line editing.

      What is the impact? #

      Successful exploitation of the vulnerability enables a remote, unauthenticated adversary to download and decrypt a full system backup containing sensitive information, such as user credentials, session tokens, SSL private keys, and Nginx configurations.

      Are updates or workarounds available? #

      Users are encouraged to update to the latest version as quickly as possible:

      • Nginx UI upgrade to version 2.3.3 and later

      How to find potentially vulnerable systems with runZero #

      From the Service Inventory, use the following query to locate systems running potentially vulnerable software:

      _asset.protocol:=http AND protocol:=http AND favicon.ico.image.mmh3:="-1565173320"

      Written by Matthew Kienow

      Matthew Kienow is a software engineer and security researcher. Matthew previously worked on the Recog recognition framework, AttackerKB as well as Metasploit's MSF 5 APIs. He has also designed, built, and successfully deployed many secure software solutions; however, often he enjoys breaking them instead. He has presented his research at various security conferences including DerbyCon, Hack In Paris, and CarolinaCon. His research has been cited by CSO, Threatpost and SC Magazine.

      More about Matthew Kienow
      Subscribe Now

      Get the latest news and expert insights delivered in your inbox.

      Welcome to the club! Your subscription to our newsletter is successful.

      See Results in Minutes

      See & secure your total attack surface. Even the unknowns & unmanageable.