← Back to feed

CVE-2026-33032 (MCPwn): Nginx-UI MCP Authentication Bypass Enables Full Web Server Takeover via Unauthenticated Tool Invocation

Date: 2026-05-01
TLP: TLP:CLEAR
Tags: malicious-tool, supply-chain

Executive Summary

CVE-2026-33032, a CVSS 9.8 authentication bypass in nginx-ui's MCP integration, has been actively exploited since mid-April 2026 after VulnCheck added it to its Known Exploited Vulnerabilities catalog on April 13. The /mcp_message endpoint is missing the AuthRequired() middleware, allowing any network-accessible attacker to invoke all 12 privileged MCP tools without credentials, achieving complete nginx server takeover in two HTTP requests. Approximately 2,600 publicly exposed nginx-ui instances were identified on Shodan at time of disclosure.

Campaign Summary

FieldDetail
Campaign / MalwareMCPwn (CVE-2026-33032)
AttributionUnknown, opportunistic mass exploitation (confidence: none)
TargetOrganizations running nginx-ui web management interface
VectorUnauthenticated HTTP requests to /mcp_message endpoint
Statusactive
First Observed2026-03

Detailed Findings

Pluto Security researcher Yotam Perkal discovered CVE-2026-33032 in early March 2026 and filed responsible disclosure on March 14. The patch shipped in nginx-ui v2.3.4 on March 15, a one-line fix adding AuthRequired() middleware to the /mcp_message route. [Pluto Security]

nginx-ui is an open-source web interface for managing Nginx servers with 11,000+ GitHub stars and 430,000+ Docker pulls. In late 2025 the project added MCP support allowing AI assistants to manage nginx configurations. The implementation mounted two HTTP endpoints: /mcp with IP whitelisting and AuthRequired middleware, and /mcp_message with IP whitelisting only and no authentication. The default IP allowlist is empty, which the middleware interprets as "allow all." [Pluto Security]

An attacker sends an unauthenticated GET to /mcp to establish an SSE session and receive a sessionId. They then POST to /mcp_message?sessionId= with no authentication headers. The 12 exposed MCP tools include nginx_config_add with auto-reload, enabling config rewrite and service restart in a single call. [Picus Security]

Recorded Future confirmed active exploitation in March 2026. VulnCheck added CVE-2026-33032 to its KEV catalog on April 13, 2026. Rapid7 published detection coverage on April 16-17, 2026. Recorded Future ranked it among the 31 most-exploited CVEs of March 2026 with a risk score of 94/100. [Rapid7, Recorded Future]

A PurpleOps report published April 16 associated exploitation with chaining CVE-2026-27944, an information leak in /api/backup, allowing recovery of long-lived secrets from backups. [PurpleOps]

Shodan identified approximately 2,689 exposed instances, concentrated in China, the US, Indonesia, Germany, and Hong Kong. The current recommended version is nginx-ui 2.3.6, released April 8, 2026. [Rapid7]

MITRE ATT&CK Mapping

TechniqueIDContext
Exploit Public-Facing ApplicationT1190Unauthenticated exploitation of /mcp_message endpoint to invoke privileged MCP tools
Server Software ComponentT1505Attacker rewrites nginx configuration files to plant credential-harvesting pages or reverse proxy routes
Modify System ProcessT1543MCP tools allow restarting and reconfiguring nginx service
Valid AccountsT1078CVE-2026-27944 chaining recovers backup credentials for lateral movement

IOCs

Domains

No domain, hash, or IP IOCs published by source. Exploitation is opportunistic mass scanning of exposed nginx-ui management interfaces.

Full URL Paths

No URL path IOCs published by source.

Splunk Format

"mcp_message" OR "nginx-ui" OR "/mcp_message"

File Hashes

No file hash IOCs published by source.

Package Indicators

nginx-ui (versions <=2.3.5)

Detection Recommendations

Monitor web proxy and WAF logs for unauthenticated POST requests to /mcp_message endpoints on nginx-ui management ports. Search EDR telemetry for nginx configuration file modifications outside of change management windows. Query Shodan or internal asset inventories for nginx-ui instances exposed on default management ports. Alert on nginx process restarts correlated with /mcp_message POST activity. Scan for CVE-2026-27944 indicators: unauthenticated GET requests to /api/backup endpoints.

References