CVE-2026-27944

CRITICAL
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 12, 2026 - 22:06 vuln.today
PoC Detected
Mar 10, 2026 - 18:11 vuln.today
Public exploit code
CVE Published
Mar 05, 2026 - 19:16 nvd
CRITICAL 9.8

Description

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.3, the /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the X-Backup-Security response header. This allows an unauthenticated attacker to download a full system backup containing sensitive data (user credentials, session tokens, SSL private keys, Nginx configurations) and decrypt it immediately. This issue has been patched in version 2.3.3.

Analysis

Unauthenticated backup download and RCE in Nginx UI before 2.3.3. EPSS 1.0%. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all systems running Nginx UI versions up to 2.3.3 and isolate them from untrusted networks; disable Nginx UI administrative interfaces if not actively required. Within 7 days: Implement network-level access controls restricting UI access to authorized administrators only; deploy WAF rules blocking exploitation patterns if available from the vendor. …

Sign in for detailed remediation steps.

Priority Score

70
Low Medium High Critical
KEV: 0
EPSS: +1.0
CVSS: +49
POC: +20

Vendor Status

Share

CVE-2026-27944 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy