Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, a user who was disabled by an administrator can use previously issued API tokens for up to the token lifetime. In practice, disabling a compromised account does not actually terminate that user’s access, so an attacker who already stole a JWT can continue reading and modifying protected resources after the account is marked disabled. Since tokens can be used to create new accounts, it is possible the disabled user to maintain the privilege. Version 2.3.4 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-x234-x5vq-cc2v | Exploit Vendor Advisory |
Configurations
History
22 Apr 2026, 17:33
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| References | () https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-x234-x5vq-cc2v - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:nginxui:nginx_ui:*:*:*:*:*:*:*:* | |
| First Time |
Nginxui nginx Ui
Nginxui |
20 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-20 21:16
Updated : 2026-04-22 17:33
NVD link : CVE-2026-33031
Mitre link : CVE-2026-33031
CVE.ORG link : CVE-2026-33031
JSON object : View
Products Affected
nginxui
- nginx_ui
