Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x234-x5vq-cc2v | Nginx-UI: Disabled users retain full API access through previously issued bearer tokens |
Wed, 22 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nginxui
Nginxui nginx Ui |
|
| CPEs | cpe:2.3:a:nginxui:nginx_ui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nginxui
Nginxui nginx Ui |
|
| Metrics |
cvssV3_1
|
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
0xjacky
0xjacky nginx-ui |
|
| Vendors & Products |
0xjacky
0xjacky nginx-ui |
Mon, 20 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, a user who was disabled by an administrator can use previously issued API tokens for up to the token lifetime. In practice, disabling a compromised account does not actually terminate that user’s access, so an attacker who already stole a JWT can continue reading and modifying protected resources after the account is marked disabled. Since tokens can be used to create new accounts, it is possible the disabled user to maintain the privilege. Version 2.3.4 patches the issue. | |
| Title | Nginx-UI: Disabled users retain full API access through previously issued bearer tokens | |
| Weaknesses | CWE-284 CWE-863 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T13:35:20.144Z
Reserved: 2026-03-17T17:22:14.669Z
Link: CVE-2026-33031
Updated: 2026-04-21T13:35:13.102Z
Status : Analyzed
Published: 2026-04-20T21:16:32.783
Modified: 2026-04-22T17:33:03.437
Link: CVE-2026-33031
No data.
OpenCVE Enrichment
Updated: 2026-04-21T00:15:16Z
Github GHSA