Description

nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files config.yaml and docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later.

INFO

Published Date :

2025-08-19T19:52:25.777Z

Last Modified :

2025-08-19T20:05:46.786Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-55740 vulnerability.

Vendors Products
Nginx-defender Project
  • Nginx-defender
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-55740.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact