CVE-2026-33027
Description
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, the nginx-ui configuration improperly handles URL-encoded traversal sequences. When specially crafted paths are supplied, the backend resolves them to the base Nginx configuration directory and executes the operation on the base directory (/etc/nginx). In particular, this allows an authenticated user to remove the entire /etc/nginx directory, resulting in a partial Denial of Service. This issue has been patched in version 2.3.4.
CWE
- CWE-22 — CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CWE-73 — CWE-73: External Control of File Name or Path
Affected
- 0xJacky / nginx-ui — v=< 2.3.4 [affected]
CVSS
- 4.0 score=6.9 severity=MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
References
- https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-m8p8-53vf-8357 x_refsource_CONFIRM
- https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.4 x_refsource_MISC
Source
cvelistV5-main/cves/2026/33xxx/CVE-2026-33027.json