Логотип exploitDog
bind:CVE-2025-55740
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-55740

Количество 2

Количество 2

nvd логотип

CVE-2025-55740

6 месяцев назад

nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files config.yaml and docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-pr72-8fxw-xx22

6 месяцев назад

Default Credentials in nginx-defender Configuration Files

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-55740

nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files config.yaml and docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later.

CVSS3: 6.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-pr72-8fxw-xx22

Default Credentials in nginx-defender Configuration Files

CVSS3: 6.5
0%
Низкий
6 месяцев назад

Уязвимостей на страницу