<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://vibewshield.com/news/nginx-ui-auth-bypass-cve-2026-33032-exploited</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T22:35:09.000Z</news:publication_date>
      <news:title><![CDATA[Nginx UI Auth Bypass CVE-2026-33032 Exploited]]></news:title>
      <news:keywords>nginx, auth bypass, CVE-2026-33032, zero-day, web security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://vibewshield.com/news/wordpress-essentialplugin-suite-hacked-malware</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T20:33:50.000Z</news:publication_date>
      <news:title><![CDATA[WordPress EssentialPlugin Suite Hacked to Push Malware]]></news:title>
      <news:keywords>WordPress, malware, supply chain attack, plugin security, backdoor</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://vibewshield.com/news/cve-2026-33032-nginx-ui-flaw-nginx-server-takeover</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:56:00.000Z</news:publication_date>
      <news:title><![CDATA[CVE-2026-33032: nginx-ui Flaw Enables Server Takeover]]></news:title>
      <news:keywords>nginx, CVE-2026-33032, web security, server vulnerability, DAST</news:keywords>
    </news:news>
  </url>
</urlset>