A critical vulnerability in the Nginx management web component known as nginx-ui - specifically in its support of the Model Context Protocol (MCP) protocol - is being exploited in nature and allows the full taking of the web service without authentication. In simple terms: an interface designed to facilitate administration can become an open door for a remote attacker to rewrite the configuration and have Nginx run malicious instructions.
The problem is that the endpoint / mcp _ message was accessible without protection, which allows an attacker to invoke privileged actions of the MCP protocol without credentials. According to the official entry into the NIST vulnerability database, this includes the ability to restart Nginx, create or modify configuration files and force automatic recharges, operations that together allow to fully control the web server ( CVE-2026-33032 in NVD).

Project managers quickly published corrections: an update was released at the beginning of March and public technical descriptions and concept tests have since appeared to show how to exploit the failure. Researchers from the Pluto Security group documented the operating vector and published a technical report with demonstrations, in addition to reporting the incidence initially ( analysis and demo of Pluto Security).
The exploitation does not require prior privileges. According to the analysis of Pluto Security, it is enough to have network access to the service: the attacker establishes a SSE (Server-Sent Events) connection to open an MCP session and, using the returned session identifier, sends requests to the endpoint / mcp _ message. This allows you to run internal MCP calls without authentication, read configuration files, inject new server blocks and force Nginx recharges for malicious changes to come into effect.
The magnitude of the risk is clear if the project's popularity is addressed: nginx-ui accumulates tens of thousands of stars in GitHub and hundreds of thousands of downloads in Docker, which translates into a significant presence on the Internet. Internet Scanning by Pluto Security with Shodan identified about 2,600 publicly accessible instances that could be affected, with greater concentration in China, the United States, Indonesia, Germany and Hong Kong ( scan details).
In addition to Pluto's technical report, threat intelligence companies have pointed to the active exploitation of the defect. A recent review of the CVE landscape by Recorded Future includes this vulnerability among those observed in use by attackers, which underlines the need for immediate action by security administrators and teams ( CVE Landscape - Recorded Future).
What can an attacker do with access to / mcp _ message? Although it is not appropriate to enter into step-by-step operating instructions, it is important to understand the scope: the attacker can read the Nginx configuration to discover internal routes or exposed credentials, write new server blocks that redirect traffic or load malicious content, and force the service recharge to activate these modifications. In other words, the integrity and availability of the server are compromised.
In view of this scenario, the most effective and priority recommendation is to update nginx-ui to a version that includes official correction. The most recent safe version is the 2.3.6, published in the project repository; applying it as soon as possible drastically reduces the risk of exploitation ( nginx-ui v2.3.6 - GitHub).

If for operational reasons it is not possible to update immediately, there are temporary mitigation measures that reduce the attack surface. Among the recommended actions are to restrict access to the management interface through firewall rules or access control lists so that only reliable management networks can be connected, specifically block the endpoint / mcp _ message in the perimeter, or disable nginx-ui while planning the parking. It is also prudent to audit Nginx configuration files in search of unauthorized changes and to review the log for SSE connections or unusual requests to the administration panel.
Finally, and not least, security teams must assume that the emergence of public exploits and the confirmation of attacks in nature raise the priority of the response: apply the patch, check obvious commitments, rotate credentials that might have been compromised and monitor intrusion indicators. The combination of immediate patch and access restrictions is the most effective defense against this type of failure in remote administration components.
For more technical context and references, see the NVD entry on vulnerability ( CVE-2026-33032), the report and the tests of Pluto Security ( Pluto analysis) and the summary of the CVE landscape published by Recorded Future ( Recorded Future - CVE Landscape).
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...