Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33029: CWE-20: Improper Input Validation in 0xJacky nginx-ui

0
Medium
VulnerabilityCVE-2026-33029cvecve-2026-33029cwe-20
Published: Mon Mar 30 2026 (03/30/2026, 17:59:04 UTC)
Source: CVE Database V5
Vendor/Project: 0xJacky
Product: nginx-ui

Description

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, an input validation vulnerability in the logrotate configuration allows an authenticated user to cause a complete Denial of Service (DoS). By submitting a negative integer for the rotation interval, the backend enters an infinite loop or an invalid state, rendering the web interface unresponsive. This issue has been patched in version 2.3.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 18:24:16 UTC

Technical Analysis

CVE-2026-33029 is a medium severity vulnerability affecting the 0xJacky nginx-ui, a web user interface for managing the Nginx web server. The flaw arises from improper input validation (CWE-20) in the logrotate configuration feature. Specifically, the application fails to validate the rotation interval input, allowing an authenticated user to submit a negative integer value. This malformed input causes the backend process to enter an infinite loop or an invalid state, effectively causing the nginx-ui web interface to become unresponsive and unavailable. Since nginx-ui is used for managing Nginx configurations and monitoring, this DoS condition can severely impact administrative operations. The vulnerability requires authenticated access but no additional user interaction or complex attack vectors. It affects all versions of nginx-ui prior to 2.3.4, where the issue has been fixed. The CVSS 4.0 vector (AV:N/AC:L/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, high privileges required, no user interaction, and high impact on availability. No public exploits have been reported to date, but the vulnerability could be leveraged by insiders or attackers with valid credentials to disrupt service.

Potential Impact

The primary impact of CVE-2026-33029 is a complete Denial of Service of the nginx-ui web interface, which can prevent administrators from managing and monitoring the Nginx web server effectively. This disruption can lead to operational delays, inability to apply configuration changes, and potential downtime if the web server requires urgent intervention. Since the vulnerability requires authenticated access, the risk is higher in environments where multiple users have administrative privileges or where credential compromise is possible. The DoS condition could be exploited by malicious insiders or attackers who have gained elevated access, potentially as part of a broader attack chain. Organizations relying on nginx-ui for critical web infrastructure management may face increased operational risk and reduced resilience until patched. Although no known exploits exist currently, the medium severity score reflects the significant availability impact and ease of exploitation by privileged users.

Mitigation Recommendations

To mitigate CVE-2026-33029, organizations should immediately upgrade nginx-ui to version 2.3.4 or later, where the input validation flaw has been corrected. Until the upgrade is applied, restrict access to the nginx-ui interface to trusted administrators only and enforce strong authentication mechanisms to reduce the risk of credential compromise. Implement monitoring and alerting for unusual logrotate configuration changes or repeated failed attempts to submit invalid inputs. Consider network segmentation or firewall rules to limit access to the management interface. Additionally, conduct regular audits of user privileges to ensure only necessary personnel have authenticated access. If possible, implement multi-factor authentication (MFA) for all users accessing nginx-ui to further reduce the risk of unauthorized exploitation. Finally, maintain up-to-date backups and incident response plans to recover quickly from potential DoS conditions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T17:22:14.669Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cabc11e6bfc5ba1d596dfb

Added to database: 3/30/2026, 6:08:17 PM

Last enriched: 3/30/2026, 6:24:16 PM

Last updated: 3/30/2026, 8:18:02 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses