CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

f5

nginx_controller

18 known vulnerabilities · sorted by CVSS score

CVE-2020-27730
CRITICAL9.8

In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.

f5 / nginx_controller+3
Network
Published Dec 11, 2020
CVE-2020-5901
CRITICAL9.6

In NGINX Controller 3.3.0-3.4.0, undisclosed API endpoints may allow for a reflected Cross Site Scripting (XSS) attack. If the victim user is logged in as admin this could result in a complete compromise of the system.

f5 / nginx_controller
Network
Published Jul 1, 2020
CVE-2020-5900
HIGH8.8

In versions 3.0.0-3.4.0, 2.0.0-2.9.0, and 1.0.1, there is insufficient cross-site request forgery (CSRF) protections for the NGINX Controller user interface.

f5 / nginx_controller+2
Network
Published Jul 1, 2020
CVE-2020-5863
HIGH8.6

In NGINX Controller versions prior to 3.2.0, an unauthenticated attacker with network access to the Controller API can create unprivileged user accounts. The user which is created is only able to upload a new license to the system but cannot view or modify any other components of the system.

f5 / nginx_controller+3
Network
Published Mar 27, 2020
CVE-2020-5867
HIGH8.1

In versions prior to 3.3.0, the NGINX Controller Agent installer script 'install.sh' uses HTTP instead of HTTPS to check and install packages

f5 / nginx_controller+3
Network
Published Apr 23, 2020
CVE-2020-5894
HIGH8.1

On versions 3.0.0-3.3.0, the NGINX Controller webserver does not invalidate the server-side session token after users log out.

f5 / nginx_controller
Network
Published May 7, 2020
CVE-2020-5895
HIGH7.8

On NGINX Controller versions 3.1.0-3.3.0, AVRD uses world-readable and world-writable permissions on its socket, which allows processes or users on the local system to write arbitrary data into the socket. A local system attacker can make AVRD segmentation fault (SIGSEGV) by writing malformed messages to the socket.

f5 / nginx_controller
Local
Published May 7, 2020
CVE-2020-5899
HIGH7.8

In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.

f5 / nginx_controller
Local
Published Jul 1, 2020
CVE-2021-23019
HIGH7.8

The NGINX Controller 2.0.0 thru 2.9.0 and 3.x before 3.15.0 Administrator password may be exposed in the systemd.txt file that is included in the NGINX support package.

f5 / nginx_controller+1
Local
Published Jun 1, 2021
CVE-2020-5910
HIGH7.5

In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.

f5 / nginx_controller+2
Network
Published Jul 2, 2020
CVE-2021-23018
HIGH7.4

Intra-cluster communication does not use TLS. The services within the NGINX Controller 3.x before 3.4.0 namespace are using cleartext protocols inside the cluster.

f5 / nginx_controller
Network
Published Jun 1, 2021
CVE-2020-5864
HIGH7.4

In versions of NGINX Controller prior to 3.2.0, communication between NGINX Controller and NGINX Plus instances skip TLS verification by default.

f5 / nginx_controller+2
Network
Published Apr 23, 2020
CVE-2020-5911
HIGH7.3

In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.

f5 / nginx_controller+2
Network
Published Jul 2, 2020
CVE-2021-23020
MEDIUM5.5

The NAAS 3.x before 3.10.0 API keys were generated using an insecure pseudo-random string and hashing algorithm which could lead to predictable keys.

f5 / nginx_controller
Local
Published Jun 1, 2021
CVE-2021-23021
MEDIUM5.5

The Nginx Controller 3.x before 3.7.0 agent configuration file /etc/controller-agent/agent.conf is world readable with current permission bits set to 644.

f5 / nginx_controller
Local
Published Jun 1, 2021
CVE-2020-5866
MEDIUM5.5

In versions of NGINX Controller prior to 3.3.0, the helper.sh script, which is used optionally in NGINX Controller to change settings, uses sensitive items as command-line arguments.

f5 / nginx_controller+2
Local
Published Apr 23, 2020
CVE-2020-5909
MEDIUM5.4

In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.

f5 / nginx_controller+2
Network
Published Jul 2, 2020
CVE-2020-5865
MEDIUM4.8

In versions prior to 3.3.0, the NGINX Controller is configured to communicate with its Postgres database server over unencrypted channels, making the communicated data vulnerable to interception via man-in-the-middle (MiTM) attacks.

f5 / nginx_controller+3
Network
Published Apr 23, 2020