nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files config.yaml and docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later.
History

Thu, 21 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Nginx-defender Project
Nginx-defender Project nginx-defender
Vendors & Products Nginx-defender Project
Nginx-defender Project nginx-defender

Tue, 19 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 Aug 2025 20:00:00 +0000

Type Values Removed Values Added
Description nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files config.yaml and docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later.
Title Default Credentials in nginx-defender Configuration Files
Weaknesses CWE-1392
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-08-19T19:52:25.777Z

Updated: 2025-08-19T20:05:46.786Z

Reserved: 2025-08-14T22:31:17.684Z

Link: CVE-2025-55740

cve-icon Vulnrichment

Updated: 2025-08-19T20:05:40.865Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-19T20:15:35.467

Modified: 2025-08-20T14:40:17.713

Link: CVE-2025-55740

cve-icon Redhat

No data.