Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-42238: CWE-94: Improper Control of Generation of Code ('Code Injection') in 0xJacky nginx-ui

0
Critical
VulnerabilityCVE-2026-42238cvecve-2026-42238cwe-94
Published: Mon May 04 2026 (05/04/2026, 20:13:22 UTC)
Source: CVE Database V5
Vendor/Project: 0xJacky
Product: nginx-ui

Description

CVE-2026-42238 is a critical code injection vulnerability in 0xJacky's nginx-ui versions prior to 2. 3. 8. The issue arises because the backup restore endpoint is unauthenticated for the first 10 minutes after startup on fresh installations, allowing remote attackers to upload malicious backup archives. By controlling the restored configuration file, attackers can inject arbitrary OS commands that execute with the privileges of the nginx-ui process, often root in Docker environments. This vulnerability has been patched in version 2. 3. 8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/04/2026, 20:51:19 UTC

Technical Analysis

The vulnerability in nginx-ui (versions before 2.3.8) involves an unauthenticated backup restore API endpoint accessible during the initial 10 minutes after process startup on fresh installs. An attacker can upload a crafted backup archive that overwrites the app.ini configuration file and SQLite database. By injecting arbitrary OS commands into the TestConfigCmd setting within app.ini, the attacker triggers command execution after the application restarts to apply the restored configuration. This results in remote code execution with the privileges of the nginx-ui process, typically root in Docker deployments. The issue is identified as CWE-94 (Improper Control of Generation of Code) and carries a CVSS 4.0 score of 9.0, indicating critical severity. The vulnerability has been fixed in version 2.3.8.

Potential Impact

Successful exploitation allows unauthenticated remote attackers to execute arbitrary OS commands as the user running nginx-ui, which is often root in Docker deployments. This can lead to full system compromise, unauthorized access, and control over the affected system. The vulnerability affects fresh installations during the first 10 minutes after startup, exploiting a time window of unauthenticated access to a sensitive restore endpoint.

Mitigation Recommendations

Upgrade nginx-ui to version 2.3.8 or later, where this vulnerability has been patched. Until upgrading, restrict network access to the nginx-ui service during startup to trusted users only, and avoid fresh installations in untrusted environments. Patch status is confirmed by the vendor's versioning information indicating the fix in 2.3.8.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-04-25T05:37:12.118Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 69f90348cbff5d8610482e45

Added to database: 5/4/2026, 8:36:24 PM

Last enriched: 5/4/2026, 8:51:19 PM

Last updated: 5/4/2026, 9:38:06 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses