CVE-2025-55740 – Ngix-Defender Default Credentials Exposure Vulnerability

The following table lists the changes that have been made to the
CVE-2025-55740 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 19, 2025

    Action Type Old Value New Value
    Added Description nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files
    config.yaml and docker-compose.yml contain default credentials (default_password: “change_me_please”, GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
    Added CWE CWE-1392
    Added Reference https://github.com/Anipaleja/nginx-defender/security/advisories/GHSA-pr72-8fxw-xx22
Share the Post:

Related Posts