Medium severity6.5NVD Advisory· Published Mar 30, 2026· Updated Apr 2, 2026
CVE-2026-33029
CVE-2026-33029
Description
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, an input validation vulnerability in the logrotate configuration allows an authenticated user to cause a complete Denial of Service (DoS). By submitting a negative integer for the rotation interval, the backend enters an infinite loop or an invalid state, rendering the web interface unresponsive. This issue has been patched in version 2.3.4.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/0xJacky/Nginx-UIGo | <= 1.99 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/0xJacky/nginx-ui/security/advisories/GHSA-cp8r-8jvw-v3qgnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-cp8r-8jvw-v3qgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33029ghsaADVISORY
- github.com/0xJacky/nginx-ui/releases/tag/v2.3.4nvdProductRelease NotesWEB
News mentions
0No linked articles in our index yet.