{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifkwe4vfvtxar4fvdli7nlzars2akyjfojwb6zudka3m6opncre4i",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mjkb5xw7vdc2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreigihhwa5v4btz4ywknmehxd5kz6f6rnuizs72rv73enejq7x6ke5i"
    },
    "mimeType": "image/png",
    "size": 495555
  },
  "path": "/2026/04/critical-nginx-ui-vulnerability-cve.html",
  "publishedAt": "2026-04-15T12:56:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnerability that enables threat actors to seize control of the Nginx service. It has been codenamed MCPwn by Pluto Security. \"",
  "title": "Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover"
}