Back to list

Nginx-UI has Server-Side Request Forgery (SSRF) via Cluster Proxy Middleware that Allows Access to Internal Services — CVE-2026-44015

GitHub · GitHub · CVE-2026-44015

ID
CVE-2026-44015
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
high
CVSS
8.5
EPSS
0.00028

Summary

### Summary An authenticated user can perform Server-Side Request Forgery (SSRF) by creating a cluster node pointing to an arbitrary internal URL and then sending API requests with the `X-Node-ID` header. The Proxy middleware forwards these requests to the attacker-specified internal address, bypassing network segmentation and enabling access to services bound to localhost or internal networks. ### Details The…

Product

go: github.com/0xJacky/Nginx-UI

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories