config.yaml and docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-25214 | Default Credentials in nginx-defender Configuration Files |
Github GHSA |
GHSA-pr72-8fxw-xx22 | Default Credentials in nginx-defender Configuration Files |
Thu, 21 Aug 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nginx-defender Project
Nginx-defender Project nginx-defender |
|
| Vendors & Products |
Nginx-defender Project
Nginx-defender Project nginx-defender |
Tue, 19 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 Aug 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files config.yaml and docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later. | |
| Title | Default Credentials in nginx-defender Configuration Files | |
| Weaknesses | CWE-1392 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-19T20:05:46.786Z
Reserved: 2025-08-14T22:31:17.684Z
Link: CVE-2025-55740
Updated: 2025-08-19T20:05:40.865Z
Status : Awaiting Analysis
Published: 2025-08-19T20:15:35.467
Modified: 2025-08-20T14:40:17.713
Link: CVE-2025-55740
No data.
OpenCVE Enrichment
Updated: 2025-08-21T12:59:10Z
EUVD
Github GHSA