Description
nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files config.yaml and docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later.
INFO
Published Date :
2025-08-19T19:52:25.777Z
Last Modified :
2025-08-19T20:05:46.786Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-55740 vulnerability.
Vendors | Products |
---|---|
Nginx-defender Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-55740.