Vulnerability Description
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, an input validation vulnerability in the logrotate configuration allows an authenticated user to cause a complete Denial of Service (DoS). By submitting a negative integer for the rotation interval, the backend enters an infinite loop or an invalid state, rendering the web interface unresponsive. This issue has been patched in version 2.3.4.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nginxui | Nginx Ui | < 2.3.4 |
Related Weaknesses (CWE)
References
- https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.4ProductRelease Notes
- https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-cp8r-8jvw-v3qgExploitVendor Advisory
FAQ
What is CVE-2026-33029?
CVE-2026-33029 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, an input validation vulnerability in the logrotate configuration allows an authenticated user to cause a complete Den...
How severe is CVE-2026-33029?
CVE-2026-33029 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33029?
Check the references section above for vendor advisories and patch information. Affected products include: Nginxui Nginx Ui.