CVE-2026-42223
Description
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, the GetSettings API handler (api/settings/settings.go:24-65) serializes all settings structs to JSON and returns them to authenticated users. Many sensitive fields are tagged with protected:"true" - however, this tag is only enforced during writes (via ProtectedFill in SaveSettings) and is completely ignored during reads. This exposes 40+ protected fields including JwtSecret (enabling auth token forgery), NodeSecret (enabling cluster node impersonation), OIDC ClientSecret (enabling OAuth account takeover), and the IP whitelist configuration. This issue has been patched in version 2.3.8.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/0xJacky/nginx-uiGo | < 2.3.8 | 2.3.8 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/0xJacky/nginx-ui/security/advisories/GHSA-q4w7-56hr-83rmnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-q4w7-56hr-83rmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-42223ghsaADVISORY
- github.com/0xJacky/nginx-ui/releases/tag/v2.3.8nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.