Critical Vulnerability in Nginx UI Exposes Server Backups to Unauthenticated Attackers
Unauthenticated access to Nginx UI servers allows attackers to download and decrypt sensitive full server backups. This critical vulnerability, identified as CVE-2026-27944, has a CVSS score of 9.8 and poses a significant risk to unprotected instances.
The vulnerability arises from two primary flaws. First, the /api/backup endpoint can be accessed without any authentication, enabling attackers to request a full system backup. Second, the server discloses the AES-256 encryption key and initialization vector within the X-Backup-Security HTTP header, allowing immediate decryption of the downloaded backup. The sensitive information at risk includes administrator credentials, session tokens, SSL private keys, and various configuration files.
When examining the attack method, it follows established patterns mapped to the MITRE ATT&CK framework, particularly influencing the areas of initial access, credential extraction, and data exfiltration. Consequently, attackers could gain full control over the Nginx management dashboard, potentially altering traffic, exposing private keys that may lead to man-in-the-middle attacks, and revealing internal infrastructure.
Defensive Context
Organizations utilizing Nginx UI should recognize the critical nature of this vulnerability as it allows unauthorized access to sensitive system backups, which can greatly jeopardize server security. Entities with Nginx UI exposed on public networks need to prioritize addressing this vulnerability, as access to sensitive backup data can lead to severe operational disruptions.
Why This Matters
The potential for attackers to easily access and decrypt full server backups translates to a real-world risk for organizations where Nginx functionalities are deployed. Those with poorly configured management interfaces or limited exposure controls face significant exposure, thus prioritizing this vulnerability is essential.
Defender Considerations
Actionable measures include immediate updates to Nginx UI to at least version 2.3.3 to resolve the unauthenticated backup access issue. Additionally, organizations should restrict access to the management interface to trusted networks, ensure that the /api/backup endpoint is protected, and monitor for unusual requests. For those who suspect they may have been attacked, rotating sensitive credentials and auditing configuration files should be undertaken.
Indicators of Compromise (IOCs)
- CVE ID: CVE-2026-27944
- Affected Product: Nginx UI
- CVSS Score: 9.8 (Critical)



