Home

Description

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, the GetSettings API handler (api/settings/settings.go:24-65) serializes all settings structs to JSON and returns them to authenticated users. Many sensitive fields are tagged with protected:"true" - however, this tag is only enforced during writes (via ProtectedFill in SaveSettings) and is completely ignored during reads. This exposes 40+ protected fields including JwtSecret (enabling auth token forgery), NodeSecret (enabling cluster node impersonation), OIDC ClientSecret (enabling OAuth account takeover), and the IP whitelist configuration. This issue has been patched in version 2.3.8.

PUBLISHED Reserved 2026-04-25 | Published 2026-05-04 | Updated 2026-05-05 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 2.3.8
affected

References

github.com/...inx-ui/security/advisories/GHSA-q4w7-56hr-83rm exploit

github.com/...inx-ui/security/advisories/GHSA-q4w7-56hr-83rm

github.com/0xJacky/nginx-ui/releases/tag/v2.3.8

cve.org (CVE-2026-42223)

nvd.nist.gov (CVE-2026-42223)

Download JSON