CVE-2026-34403
Description
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.5, all WebSocket endpoints in nginx-ui use a gorilla/websocket Upgrader with CheckOrigin unconditionally returning true, allowing Cross-Site WebSocket Hijacking (CSWSH). Combined with the fact that authentication tokens are stored in browser cookies (set via JavaScript without HttpOnly or explicit SameSite attributes), a malicious webpage can establish authenticated WebSocket connections to the nginx-ui instance when a logged-in administrator visits the attacker-controlled page. Version 2.3.5 patches the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/0xJacky/Nginx-UIGo | < 1.9.10-0.20260316053337-1a9cd29a3082 | 1.9.10-0.20260316053337-1a9cd29a3082 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/0xJacky/nginx-ui/security/advisories/GHSA-78mf-482w-62qjnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-78mf-482w-62qjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-34403ghsaADVISORY
- github.com/0xJacky/nginx-ui/releases/tag/v2.3.5nvdProductRelease NotesWEB
News mentions
0No linked articles in our index yet.