{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifkwe4vfvtxar4fvdli7nlzars2akyjfojwb6zudka3m6opncre4i",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mjkb5xw7vdc2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreigihhwa5v4btz4ywknmehxd5kz6f6rnuizs72rv73enejq7x6ke5i"
},
"mimeType": "image/png",
"size": 495555
},
"path": "/2026/04/critical-nginx-ui-vulnerability-cve.html",
"publishedAt": "2026-04-15T12:56:00.000Z",
"site": "https://thehackernews.com",
"textContent": "A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnerability that enables threat actors to seize control of the Nginx service. It has been codenamed MCPwn by Pluto Security. \"",
"title": "Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover"
}