High severity8.8NVD Advisory· Published Mar 30, 2026· Updated Apr 1, 2026
CVE-2026-33030
CVE-2026-33030
Description
Nginx UI is a web user interface for the Nginx web server. In versions 2.3.3 and prior, Nginx-UI contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated user to access, modify, and delete resources belonging to other users. The application's base Model struct lacks a user_id field, and all resource endpoints perform queries by ID without verifying user ownership, enabling complete authorization bypass in multi-user environments. At time of publication, there are no publicly available patches.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/0xJacky/nginx-uiGo | <= 1.99 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/0xJacky/nginx-ui/security/advisories/GHSA-5hf2-vhj6-gj9mnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-5hf2-vhj6-gj9mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33030ghsaADVISORY
- github.com/0xJacky/nginx-ui/releases/tag/v2.3.4ghsaWEB
News mentions
0No linked articles in our index yet.