MCPwn the critical vulnerability of nginx-ui that allows to take full control of Nginx in seconds

Published 4 min de lectura 109 reading

A critical vulnerability in nginx- ui - an open-source web interface to manage Nginx - is being actively exploited in nature and forces managers and infrastructure managers to react immediately. Registered as CVE-2026-33032 and nicknamed MCPwn by Pluto Security researchers, the failure allows the authentication to be skipped and the Nginx service to be fully controlled in seconds.

The problem lies in how nginx-ui integrates the MCP protocol (Model Context Protocol). The integration sets out two HTTP endpoints: / mcp and / mcp _ message. According to the project maintainers, while/ mcprequires you to go through an authentication mechanism and require white list of IP, the point/ mcp _ messagejust apply IP filtering - and also the default value of that white list behaves as "allowing everyone" when it is empty. This combination leaves an open door: an attacker on the network can invoke MCP tools without presenting credentials.

MCPwn the critical vulnerability of nginx-ui that allows to take full control of Nginx in seconds
Image generated with IA.

The operating flow described by the discoverer, Yotam Perkal of Pluto Security, is surprisingly simple. With two HTTP requests you can achieve control: first a GET to/ mcpto log in and get a session identifier, and then a POST to/ mcp _ messageusing that ID to run any MCP tool without authentication. In practice, this allows actions as dangerous as reboot Nginx, create, modify or delete configuration files and force configuration recharges - in other words, full take of Nginx service. In addition, an attacker with these capabilities could divert traffic, introduce proxy rules to capture administrative credentials or insert persistent payloads.

After the responsible disclosure, the maintainers published a correction in the version 2.3.4 released on 15 March 2026. For organizations that cannot apply the patch immediately, temporary mitigation is offered: add explicitly middleware.AuthRequired () to the point/ mcp _ messageto force authentication, or change the default logic of the white list of IP to move from "allowing everything" to "denying everything." However, researchers have warned that the nature of the failure makes any unpatched and accessible deployment from the network an imminent risk.

The context amplifies the alarm. A recent report by Recorded Future included this vulnerability among the most exploited in March 2026, and Internet search data - for example through tools such as Shodan - indicate that there are thousands of publicly accessible instances. Pluto Security told media that they estimated about 2,600 detectable instances, with a greater presence in countries such as China, the United States, Indonesia, Germany and Hong Kong. This exposed area makes the recommendation to "update now" an operational priority.

Those who manage environments with nginx-ui should act quickly: apply the patch to version 2.3.4, disable MCP functionality if not strictly necessary and limit access to the management interface by using network access control lists, VPNs or firewalls. It is also good practice to audit the configuration files and review change records and accesses to detect unusual operations that match the exposure window.

This incident is also part of a broader pattern that affects integrations that inherit functionalities but not always the same safety barriers. According to Perkal, when MCP is incorporated into existing applications, its endpoints can preserve host software capabilities without respecting the authentication mechanisms already implemented, creating a kind of unnoticed "back door."

MCPwn the critical vulnerability of nginx-ui that allows to take full control of Nginx in seconds
Image generated with IA.

The appearance of MCPwn comes shortly after the finding of another set of MCP server-related failures in third-party software: two vulnerabilities in the MCP server of Atlassian, listed as CVE-2026-27825 and CVE-2026-27826 and nicknamed MCPwnfluence, which can be chained to achieve remote code execution without authentication from the same local network. It is a reminder that the auxiliary parts of an ecosystem (protocols, extensions, integrations) can become critical vectors if they are not assured with the same rigour as the core of the application.

For additional sources and readings on the event and its technical evaluation, see the CVE tab in NVD ( https: / / nvd.nist.gov / vuln / detail / CVE-2026-33032), public analysis and press releases of researchers and cyber security companies such as Recorded Future ( https: / / www.comardedfuture.com /) and service scans exposed by Shodan ( https: / / www.showan.io / search? query = nginx-ui). It is also recommended to follow the communication of the project maintainers in their repository and official pages to obtain the patch and specific update instructions; a search in GitHub makes it easier to locate the latest stable version ( https: / / github.com / search? q = nginx-ui).

In short, MCPwn is a clear example of why management interfaces and protocol integration require as strict security controls as the services they control. If you administer Nginx by nginx-ui: Treat this as an operational emergency, prioritizes the update and immediately limits access to any exposed instance to confirm that it is patched and properly configured.

Coverage

Related

More news on the same subject.