Nexpose Rapid7 Nexpose

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Rapid7 Nexpose.

By the Year

In 2026 there have been 1 vulnerability in Rapid7 Nexpose. Nexpose did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.




Year Vulnerabilities Average Score
2026 1 0.00
2025 0 0.00
2024 0 0.00
2023 2 7.55
2022 3 7.13
2021 3 5.60
2020 3 6.37
2019 2 8.80

It may take a day or so for new Nexpose vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Rapid7 Nexpose Security Vulnerabilities

Rapid7 Nexpose <6.4.50: Weak RNG in CredentialsKeyStorePassword
CVE-2026-1814 - February 03, 2026

Rapid7 Nexpose versions 6.4.50 and later are vulnerable to an insufficient entropy issue in the CredentialsKeyStorePassword.generateRandomPassword() method. When updating legacy keystore passwords, the application generates a new password with insufficient length (7-12 characters) and a static prefix 'p', resulting in a weak keyspace. An attacker with access to the nsc.ks file can brute-force this password using consumer-grade hardware to decrypt stored credentials.

Insufficient Entropy

Forced Browsing CVE-2023-1699 in Rapid7 Nexpose <=6.6.186 Fix in 6.6.187
CVE-2023-1699 9.8 - Critical - March 30, 2023

Rapid7 Nexpose versions 6.6.186 and below suffer from a forced browsing vulnerability. This vulnerability allows an attacker to manipulate URLs to forcefully browse to and access administrative pages. This vulnerability is fixed in version 6.6.187.

forced browsing

Rapid7 Nexpose/InsightVM <6.6.178 Update Server Cert Validation Flaw - MITM
CVE-2022-3913 5.3 - Medium - February 01, 2023

Rapid7 Nexpose and InsightVM versions 6.6.82 through 6.6.177 fail to validate the certificate of the update server when downloading updates. This failure could allow an attacker in a privileged position on the network to provide their own HTTPS endpoint, or intercept communications to the legitimate endpoint. The attacker would need some pre-existing access to at least one node on the network path between the Rapid7-controlled update server and the Nexpose/InsightVM application, and the ability to either spoof the update server's FQDN or redirect legitimate traffic to the attacker's server in order to exploit this vulnerability. Note that even in this scenario, an attacker could not normally replace an update package with a malicious package, since the update process validates a separate, code-signing certificate, distinct from the HTTPS certificate used for communication. This issue was resolved on February 1, 2023 in update 6.6.178 of Nexpose and InsightVM.

Improper Certificate Validation

Rapid7 Nexpose/InsightVM Update Auth Validation Flaw CVE-2022-4261 (6.6.172)
CVE-2022-4261 6.5 - Medium - December 08, 2022

Rapid7 Nexpose and InsightVM versions prior to 6.6.172 failed to reliably validate the authenticity of update contents. This failure could allow an attacker to provide a malicious update and alter the functionality of Rapid7 Nexpose. The attacker would need some pre-existing mechanism to provide a malicious update, either through a social engineering effort, privileged access to replace downloaded updates in transit, or by performing an Attacker-in-the-Middle attack on the update service itself.

Download of Code Without Integrity Check

Rapid7 Nexpose versions 6.6.129 and earlier suffer
CVE-2022-0758 6.1 - Medium - March 17, 2022

Rapid7 Nexpose versions 6.6.129 and earlier suffer from a reflected cross site scripting vulnerability, within the shared scan configuration component of the tool. With this vulnerability an attacker could pass literal values as the test credentials, providing the opportunity for a potential XSS attack. This issue is fixed in Rapid7 Nexpose version 6.6.130.

XSS

Rapid7 Nexpose versions 6.6.93 and earlier are susceptible to an SQL Injection vulnerability
CVE-2022-0757 8.8 - High - March 17, 2022

Rapid7 Nexpose versions 6.6.93 and earlier are susceptible to an SQL Injection vulnerability, whereby valid search operators are not defined. This lack of validation can allow a logged-in, authenticated attacker to manipulate the "ANY" and "OR" operators in the SearchCriteria and inject SQL code. This issue was fixed in Rapid7 Nexpose version 6.6.129.

SQL Injection

Rapid7 Nexpose versions prior to 6.6.114 suffer
CVE-2019-5640 5.3 - Medium - November 22, 2021

Rapid7 Nexpose versions prior to 6.6.114 suffer from an information exposure issue whereby, when the user's session has ended due to inactivity, an attacker can use the inspect element browser feature to remove the login panel and view the details available in the last webpage visited by previous user

Information Disclosure

Rapid7 Nexpose version 6.6.95 and earlier
CVE-2021-31868 5.4 - Medium - August 19, 2021

Rapid7 Nexpose version 6.6.95 and earlier allows authenticated users of the Security Console to view and edit any ticket in the legacy ticketing feature, regardless of the assignment of the ticket. This issue was resolved in version 6.6.96, released on August 4, 2021.

Missing Authentication for Critical Function

Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature
CVE-2021-3535 6.1 - Medium - June 16, 2021

Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. This issue affects version 6.6.80 and prior, and is fixed in 6.6.81. If your Security Console currently falls on or within this affected version range, ensure that you update your Security Console to the latest version.

XSS

A SQL Injection issue in Rapid7 Nexpose version prior to 6.6.49
CVE-2020-7383 6.5 - Medium - October 14, 2020

A SQL Injection issue in Rapid7 Nexpose version prior to 6.6.49 that may have allowed an authenticated user with a low permission level to access resources & make changes they should not have been able to access.

SQL Injection

In Rapid7 Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable
CVE-2020-7381 5.8 - Medium - September 03, 2020

In Rapid7 Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during a Security Console installation and any arbitrary code executable using the same file name.

Code Injection

Rapid7 Nexpose installer version prior to 6.6.40 contains an Unquoted Search Path which may
CVE-2020-7382 6.8 - Medium - September 03, 2020

Rapid7 Nexpose installer version prior to 6.6.40 contains an Unquoted Search Path which may allow an attacker on the local machine to insert an arbitrary file into the executable path. This issue affects: Rapid7 Nexpose versions prior to 6.6.40.

Unquoted Search Path or Element

Rapid7 Nexpose versions 6.5.50 and prior suffer
CVE-2019-5638 8.8 - High - August 21, 2019

Rapid7 Nexpose versions 6.5.50 and prior suffer from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage.

Insufficient Session Expiration

A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose InsightVM Security Console versions 6.5.0 through 6.5.68
CVE-2019-5630 8.8 - High - July 03, 2019

A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose InsightVM Security Console versions 6.5.0 through 6.5.68. This issue allows attackers to exploit CSRF vulnerabilities on API endpoints using Flash to circumvent a cross-domain pre-flight OPTIONS request.

Session Riding

Versions of Nexpose prior to 6.4.66 fail to adequately validate the source of HTTP requests intended for the Automated Actions administrative web application
CVE-2017-5264 - December 14, 2017

Versions of Nexpose prior to 6.4.66 fail to adequately validate the source of HTTP requests intended for the Automated Actions administrative web application, and are susceptible to a cross-site request forgery (CSRF) attack.

Session Riding

The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions
CVE-2017-5243 - June 06, 2017

The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions. As a result, it falls back to allowing ALL algorithms supported by the relevant version of OpenSSH and makes the installations vulnerable to a range of MITM, downgrade, and decryption attacks.

Use of a Broken or Risky Cryptographic Algorithm

The Java keystore in all versions and editions of Rapid7 Nexpose prior to 6.4.50 is encrypted with a static password of 'r@p1d7k3y5t0r3'
CVE-2017-5230 - March 02, 2017

The Java keystore in all versions and editions of Rapid7 Nexpose prior to 6.4.50 is encrypted with a static password of 'r@p1d7k3y5t0r3' which is not modifiable by the user. The keystore provides storage for saved scan credentials in an otherwise secure location on disk.

All editions of Rapid7 Nexpose installers prior to version 6.4.24 contain a DLL preloading vulnerability
CVE-2017-5232 - March 02, 2017

All editions of Rapid7 Nexpose installers prior to version 6.4.24 contain a DLL preloading vulnerability, wherein it is possible for the installer to load a malicious DLL located in the current working directory of the installer.

In the Create Tags page of the Rapid7 Nexpose version 6.4.12 user interface, any authenticated user who has the capability to create tags
CVE-2016-9757 - December 20, 2016

In the Create Tags page of the Rapid7 Nexpose version 6.4.12 user interface, any authenticated user who has the capability to create tags can inject cross-site scripting (XSS) elements in the tag name field. Once this tag is viewed in the Tag Detail page of the Rapid7 Nexpose 6.4.12 UI by another authenticated user, the script is run in that user's browser context.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Rapid7 Nexpose or by Rapid7? Click the Watch button to subscribe.

Rapid7
Vendor

subscribe