Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/neuvector/neuvector
  4. ›
  5. CVE-2025-8077

CVE-2025-8077: NeuVector admin account has insecure default password

August 28, 2025 (updated September 17, 2025)

A vulnerability exists in NeuVector versions up to and including 5.4.5, where a fixed string is used as the default password for the built-in admin account. If this password is not changed immediately after deployment, any workload with network access within the cluster could use the default credentials to obtain an authentication token. This token can then be used to perform any operation via NeuVector APIs.

In earlier versions, NeuVector supports setting the default (bootstrap) password for the admin account using a Kubernetes Secret named neuvector-bootstrap-secret. This Secret must contain a key named bootstrapPassword. However, if NeuVector fails to retrieve this value, it falls back to the fixed default password.

References

  • bugzilla.suse.com/show_bug.cgi?id=CVE-2025-8077
  • github.com/advisories/GHSA-8pxw-9c75-6w56
  • github.com/neuvector/neuvector
  • github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56
  • nvd.nist.gov/vuln/detail/CVE-2025-8077

Code Behaviors & Features

Detect and mitigate CVE-2025-8077 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.0.0 before 5.4.6

Fixed versions

  • 5.4.6

Solution

Upgrade to version 5.4.6 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-1393: Use of Default Password

Source file

go/github.com/neuvector/neuvector/CVE-2025-8077.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 07 Dec 2025 00:21:17 +0000.