CVE-2026-1441
- EPSS 0.04%
- Veröffentlicht 18.02.2026 13:14:11
- Zuletzt bearbeitet 18.02.2026 20:20:16
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response withou...
CVE-2026-1440
- EPSS 0.04%
- Veröffentlicht 18.02.2026 13:13:51
- Zuletzt bearbeitet 18.02.2026 20:20:33
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response withou...
CVE-2026-1439
- EPSS 0.04%
- Veröffentlicht 18.02.2026 13:13:36
- Zuletzt bearbeitet 18.02.2026 20:20:50
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response withou...
CVE-2026-1438
- EPSS 0.04%
- Veröffentlicht 18.02.2026 13:13:23
- Zuletzt bearbeitet 18.02.2026 20:21:08
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response withou...
CVE-2026-1437
- EPSS 0.05%
- Veröffentlicht 18.02.2026 13:12:57
- Zuletzt bearbeitet 18.02.2026 20:21:24
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response withou...
CVE-2026-1436
- EPSS 0.03%
- Veröffentlicht 18.02.2026 13:09:35
- Zuletzt bearbeitet 18.02.2026 20:23:53
Improper Access Control (IDOR) in the Graylog API, version 2.2.3, which occurs when modifying the user ID in the URL. An authenticated user can access other user's profiles without proper authorization checks. Exploiting this vulnerability allows val...
CVE-2026-1435
- EPSS 0.07%
- Veröffentlicht 18.02.2026 13:08:36
- Zuletzt bearbeitet 18.02.2026 20:22:51
Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not inv...
CVE-2025-53106
- EPSS 0.06%
- Veröffentlicht 02.07.2025 13:28:08
- Zuletzt bearbeitet 30.10.2025 15:45:51
Graylog is a free and open log management platform. In versions 6.2.0 to before 6.2.4 and 6.3.0-alpha.1 to before 6.3.0-rc.2, Graylog users can gain elevated privileges by creating and using API tokens for the local Administrator or any other user fo...
CVE-2025-46827
- EPSS 0.14%
- Veröffentlicht 07.05.2025 15:29:31
- Zuletzt bearbeitet 03.11.2025 19:29:31
Graylog is a free and open log management platform. Prior to versions 6.0.14, 6.1.10, and 6.2.0, it is possible to obtain user session cookies by submitting an HTML form as part of an Event Definition Remediation Step field. For this attack to succee...
CVE-2025-30373
- EPSS 0.08%
- Veröffentlicht 07.04.2025 14:37:58
- Zuletzt bearbeitet 30.10.2025 18:54:24
Graylog is a free and open log management platform. Starting with 6.1, HTTP Inputs can be configured to check if a specified header is present and has a specified value to authenticate HTTP-based ingestion. Unfortunately, even though in cases of a mi...