Threat Advisories:
New Report Critical Threat Research : The Iranian Cyber War Intensifies! Download the Report

MCPwn: Critical Nginx UI Bug Opens the Door to Remote Control

Red | Vulnerability Report
Download PDF

Summary

CVE-2026-33032, dubbed MCPwn by security researchers, exposes a critical authentication bypass vulnerability in Nginx UI that effectively removes authentication requirements for accessing powerful backend functions. This Nginx UI vulnerability stems from a misconfiguration in how security controls are applied to the MCP (Model Context Protocol) transport layer, allowing attackers to directly interact with the /mcp_message endpoint without any authentication.

The Nginx UI authentication bypass vulnerability is compounded by a fail-open IP whitelist design that permits all requests by default when no whitelist entries are configured. This security flaw enables unauthenticated attackers to invoke sensitive MCP tools, including configuration modification capabilities, service reload functions, and full Nginx restart controls, all without requiring any credentials whatsoever.

The MCPwn vulnerability affects all Nginx UI versions up to and including version 2.3.5. Security researchers have confirmed active exploitation in the wild, with thousands of exposed Nginx UI instances identified across major cloud providers. Internet-wide scanning has revealed numerous publicly accessible deployments running with default configurations, making them immediate targets for exploitation.

Vulnerability Details

Root Cause and Architecture Flaw

CVE-2026-33032 vulnerability stems from an architectural inconsistency in authentication enforcement across the MCP Server-Sent Events (SSE) transport layer in Nginx UI. The implementation splits MCP communication into two distinct endpoints: a persistent listening channel (GET /mcp) and an action channel (POST /mcp_message). Both endpoints ultimately rely on the same backend handler, mcp.ServeHTTP(), to process tool operations.

However, authentication middleware is selectively applied only to the /mcp endpoint, leaving the /mcp_message route completely exposed to unauthenticated access. This creates a critical security gap where attackers can bypass authentication entirely by targeting the unprotected endpoint directly.

Fail-Open IP Whitelist Weakness

The authentication bypass vulnerability is further compounded by a flawed fallback security mechanism. The /mcp_message endpoint relies solely on IP whitelist-based access control, but this safeguard proves ineffective due to a fail-open design pattern. In default configurations where the IP whitelist is unset or empty, the middleware permits all incoming requests without restriction.

This fail-open behavior is explicitly coded into the system to allow execution when no whitelist entries exist, effectively rendering fresh Nginx UI installations fully accessible to unauthenticated users from any network location. The combination of missing authentication controls and permissive default settings creates a dangerous condition where external actors can directly interact with sensitive backend functionality.

Exploitation Methodology

Exploitation of the MCPwn vulnerability is straightforward and highly impactful. An attacker initiates exploitation by issuing a GET /mcp request to establish a Server-Sent Events (SSE) connection and retrieve a session identifier. This is followed by crafted POST requests to the unprotected /mcp_message endpoint, embedding JSON-RPC payloads that invoke available MCP tools.

Of the 12 exposed MCP tools, several enable high-impact actions including Nginx configuration modification, service reload operations, and complete Nginx restarts. These capabilities effectively grant attackers the ability to tamper with server behavior, disrupt operations, or gain reconnaissance visibility into system configurations. Critically, these actions require no credentials, API keys, tokens, or session validation, making exploitation trivial for even unsophisticated attackers.

Active Exploitation and Exposure

The MCPwn vulnerability affects all Nginx UI versions through v2.3.5, placing a significant number of deployments at immediate risk. Evidence confirms that exploitation is already underway in the wild, with security researchers flagging CVE-2026-33032 as one of the most actively targeted vulnerabilities and assigning it a near-critical risk score.

Internet-wide vulnerability scans have identified thousands of exposed Nginx UI instances across major cloud infrastructure providers, with many publicly accessible installations running default configurations that maximize vulnerability exposure. Given the ease of exploitation, absence of authentication controls, and confirmed in-the-wild attack activity, this vulnerability represents a serious operational security risk requiring immediate remediation.

Recommendations

Update Nginx UI to the latest version immediately. The security patch released on March 15, 2026, adds the missing AuthRequired() middleware to the vulnerable /mcp_message endpoint. Given confirmed active exploitation in the wild, upgrading Nginx UI is the most critical and urgent remediation step. Organizations should prioritize this Nginx UI update ahead of standard patch cycles due to the severity of the authentication bypass vulnerability.

Disable MCP integration or restrict IP whitelisting as an emergency stopgap measure. If immediate upgrade is not feasible, disable the MCP integration entirely or configure the IP whitelist to explicitly allow only trusted management hosts. Do not leave the default fail-open whitelist configuration in place, as it permits unrestricted access from any network-reachable host.

Audit Nginx configuration files for unauthorized changes that may indicate compromise. Review the conf.d/ and sites-enabled/ directories for unfamiliar or suspicious configuration files that may have been injected through unauthenticated MCP tool calls. Examine Nginx access logs for unexpected requests to /mcp_message originating from untrusted IP addresses, and investigate any configuration reload events that do not correlate with authorized administrative activity.

Restrict network exposure of the Nginx UI backend port to prevent unauthorized access. Ensure that the Nginx UI backend port (default 9000) is not exposed to the public internet or untrusted network segments. Deploy firewall rules or network segmentation to limit access to authorized management workstations and administrative VPN subnets only.

Rotate credentials and review administrative accounts if exploitation is suspected. If the MCPwn vulnerability exploitation is suspected, rotate all administrative credentials for Nginx UI, including JWT secrets. Review active user accounts for unauthorized additions and invalidate all existing sessions. Additionally, inspect Nginx log format configurations for injected directives designed to capture Authorization headers or other sensitive data.

MITRE ATT&CK TTPs

Initial Access: T1190 (Exploit Public-Facing Application)

Execution: T1059 (Command and Scripting Interpreter)

Persistence: T1505 (Server Software Component)

Privilege Escalation: T1068 (Exploitation for Privilege Escalation)

Discovery: T1083 (File and Directory Discovery)

Collection: T1557 (Adversary-in-the-Middle)

Impact: T1489 (Service Stop), T1565 (Data Manipulation), T1565.002 (Transmitted Data Manipulation)

References

https://github.com/0xJacky/nginx-ui/commit/413dc63

https://github.com/0xJacky/nginx-ui/releases

https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h6c2-x2m2-mwhf

https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox