CVE-2026-42221
Description
Nginx UI is a web user interface for the Nginx web server. From version 2.0.0 to before version 2.3.8, an unauthenticated network attacker can claim the initial administrator account on a fresh nginx-ui instance during the first-run setup window. The public /api/install endpoint is reachable without authentication, and the request-encryption flow only protects payload confidentiality in transit; it does not authenticate who is allowed to perform installation. A remote attacker who reaches the service before the legitimate operator can set the admin email, username, and password, causing permanent initial-instance takeover. This issue has been patched in version 2.3.8.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/0xJacky/Nginx-UIGo | >= 2.0.0, < 2.3.8 | 2.3.8 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/0xJacky/nginx-ui/security/advisories/GHSA-h27v-ph7w-m9fpnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-h27v-ph7w-m9fpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-42221ghsaADVISORY
- github.com/0xJacky/nginx-ui/releases/tag/v2.3.8nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.