TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Rapid7 Blog

CVE-2026-33032: Nginx UI Missing MCP Authentication

Rapid7 · 2026-04-16 · Read original ↗

ATT&CK techniques detected

5 predictions
T1190Exploit Public-Facing Application
98%
"cve - 2026 - 33032 : nginx ui missing mcp authentication overview on march 30, 2026, a security advisory was published for a critical vulnerability affecting nginx ui. nginx ui is an open - source web interface to centralize the management of nginx configurations and ssl certific…"
T1190Exploit Public-Facing Application
70%
"the managed nginx service. according to a recorded future report published on april 13, 2026, exploitation of cve - 2026 - 33032 in the wild has begun. a purpleops report published on april 16, 2026 associated exploitation of cve - 2026 - 33032 in the wild with the information le…"
T1588.006Vulnerabilities
63%
"vulnerabilities and exploits fortigate cve - 2025 - 59718 exploitation : incident response findings eric carey, olivia henderson + 1 threat research the attack cycle is accelerating : announcing the rapid7 2026 global threat landscape report rapid7 labs threat research introducin…"
T1190Exploit Public-Facing Application
48%
". the information leak vulnerability being exploited in the wild with cve - 2026 - 33032, cve - 2026 - 27944, was patched in version 2. 3. 3. this discrepancy in affected version numbers introduces confusion as to the correct version required to remediate cve - 2026 - 33032. to a…"
T1588.006Vulnerabilities
31%
". the information leak vulnerability being exploited in the wild with cve - 2026 - 33032, cve - 2026 - 27944, was patched in version 2. 3. 3. this discrepancy in affected version numbers introduces confusion as to the correct version required to remediate cve - 2026 - 33032. to a…"

Summary

Overview

On March 30, 2026, a security advisory was published for a critical vulnerability affecting Nginx UI. Nginx UI is an open-source web interface to centralize the management of Nginx configurations and SSL certificates. The critical vulnerability, CVE-2026-33032, was reported in early March by Pluto Security researcher Yotam Perkal and subsequently patched on March 15, 2026. That same day, Pluto Security published a technical blog post with some vulnerability details.

CVE-2026-33032 is a missing authentication bug with a CVSS score of 9.8; as a result of missing authentication controls, an unauthenticated attacker who exploits CVE-2026-27944 to leak information can access a Model Context Protocol (MCP) server that can perform privileged operations on managed Nginx web servers. Systems are vulnerable in the default IP allowlist configuration, which allows any remote IP to access MCP functionality. Exploitation results in full attacker control of the managed Nginx service. 

According to a Recorded Future report published on April 13, 2026, exploitation of CVE-2026-33032 in the wild has begun. A PurpleOps report published on April 16, 2026 associated exploitation of CVE-2026-33032 in the wild with the information leak vulnerability CVE-2026-27944, indicating that these two vulnerabilities are being exploited as a chain.

Mitigation guidance

Organizations running Nginx UI should prioritize updating on an urgent basis to remediate CVE-2026-33032. Additionally, to reduce exposure to future vulnerabilities affecting Nginx UI, defenders should ensure that network access to the Nginx UI management interface is strictly limited to those who must have it.

Affected versions:

According to the finder’s blog post, version 2.3.3 and prior are affected, and the fix is present in version 2.3.4 and later. However the official CVE record states that versions 2.3.5 and below are affected. The information leak vulnerability being exploited in the wild with CVE-2026-33032, CVE-2026-27944, was patched in version 2.3.3. This discrepancy in affected version numbers introduces confusion as to the correct version required to remediate CVE-2026-33032. To avoid this version number discrepancy, users are advised to update to the very latest version (2.3.6).

Please read the vendor advisory for the latest guidance.

Rapid7 customers

Exposure Command, InsightVM, and Nexpose

Exposure Command, InsightVM, and Nexpose customers can assess exposure to CVE-2026-33032 with unauthenticated checks available in the April 17 content release.

Updates

  • April 16, 2026: Initial publication.

  • April 17, 2026: Added additional details on exploitation workflow, vulnerable software versions, and product coverage.