Description

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, the GetSettings API handler (api/settings/settings.go:24-65) serializes all settings structs to JSON and returns them to authenticated users. Many sensitive fields are tagged with protected:"true" - however, this tag is only enforced during writes (via ProtectedFill in SaveSettings) and is completely ignored during reads. This exposes 40+ protected fields including JwtSecret (enabling auth token forgery), NodeSecret (enabling cluster node impersonation), OIDC ClientSecret (enabling OAuth account takeover), and the IP whitelist configuration. This issue has been patched in version 2.3.8.

INFO

Published Date :

2026-05-04T20:12:00.546Z

Last Modified :

2026-05-05T14:08:40.851Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-42223 vulnerability.

Vendors Products
0xjacky
  • Nginx-ui
Nginxui
  • Nginx Ui
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-42223.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact