Tuesday, April 28, 2026

PoC Exploit Code Published for nginx-ui Backup Restore Security Flaw

A critical security flaw in the nginx-ui backup restore mechanism, tracked as CVE-2026-33026, allows attackers to manipulate encrypted backups and execute arbitrary commands.

Proof-of-Concept (PoC) exploit code has been publicly released, prompting an urgent need for administrators to update to version 2.3.4.

Backup Integrity Bypass Flaw

The vulnerability stems from a circular trust model where the backup format lacks a secure integrity root.

cipher = AES.new(key, AES.MODE_CBC, iv)
decrypted = cipher.decrypt(encrypted_data)
return unpad(decrypted, AES.block_size)
with zipfile.ZipFile(file_path, 'r') as main_zip:
    main_zip.extractall(output_dir)

files_to_decrypt = ["hash_info.txt", "nginx-ui.zip", "nginx.zip"]

for filename in files_to_decrypt:
    path = os.path.join(output_dir, filename)
    if os.path.exists(path):
        with open(path, "rb") as f:
            encrypted = f.read()

        decrypted = decrypt_aes_cbc(encrypted, key_b64, iv_b64)

        out_path = path + ".decrypted"
        with open(out_path, "wb") as f:
            f.write(decrypted)
        print(f"[*] Successfully decrypted: {out_path}")

The application provides the AES encryption key and Initialization Vector (IV) directly to the client as a security token, which encrypts both the data and the integrity metadata, as reported by Security Researcher 0xJacky.

Attackers can use this token to decrypt the archive, alter configuration files, update the SHA-256 hashes, and re-encrypt the bundle for restoration.

Generate a backup and extract the security token (Source: Github)
Generate a backup and extract the security token (Source: Github)

Because the restore process accepts the modified integrity metadata generated by the attacker, malicious configurations are seamlessly applied to the server environment.

This manipulation grants threat actors the ability to insert backdoors and achieve arbitrary command execution on the host machine.

The exploit operates silently regardless of hash mismatches, potentially leading to a complete compromise of the nginx-ui deployment.

The system accepts the modified backup (Source: Github)
The system accepts the modified backup (Source: Github)

Administrators must immediately upgrade their nginx-ui installations to the patched version 2.3.4 to secure their infrastructure.

Developers are advised to introduce a trusted integrity root, such as signing backup metadata using a server-side private key rather than client-exposed tokens.

Furthermore, enforcing strict server-side integrity verification during the restore process will prevent attacker-controlled data from being processed entirely.

Follow us on Google NewsLinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Hot this week

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep Web The deep web, invisible web, or...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything...

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an...

Web Server Penetration Testing Checklist – 2026

Web server pentesting is performed under three significant categories: identity,...

Hugging Face LeRobot Flaw Opens Door to Remote Code Execution Attacks

A critical remote code execution (RCE) vulnerability has been...

Silk Typhoon Hacker Extradited to U.S. from Italy

Chinese authorities-linked hacker Xu Zewei, accused of playing a...

Checkmarx Confirms Security Incident Involving GitHub Repository Exposure

Application security provider Checkmarx has officially confirmed a new...

Fake Tax Audits and Updates Fuel Silver Fox Malware Campaign

A China-linked threat group known as Silver Fox is...

Microsoft Expands Copilot Agent Mode for Outlook Inbox and Calendar Tasks

Microsoft announced a major evolution for Copilot in Outlook,...

Chinese-Backed Smishing Rings Scale Credential Theft via SMS and OTT Apps

Chinese-language phishing-as-a-service (PhaaS) platforms are rapidly expanding their global...

Sandworm Uses SSH-over-Tor Tunnel for Stealthy Long-Term Persistence

A significant evolution in Sandworm (APT-C-13) tradecraft, revealing the...

WhatsApp Tests Encrypted Cloud Backup Service for Safer Message Storage

WhatsApp is actively developing an independent, first-party cloud backup...

Related Articles

Recent News