Home

Description

nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files config.yaml and docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later.

PUBLISHED Reserved 2025-08-14 | Published 2025-08-19 | Updated 2025-08-19 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-1392: Use of Default Credentials

Product status

< 1.5.0
affected

References

github.com/...fender/security/advisories/GHSA-pr72-8fxw-xx22

cve.org (CVE-2025-55740)

nvd.nist.gov (CVE-2025-55740)

Download JSON