CVE-2025-46827 – org.graylog2:graylog2-server
Package
Manager: maven
Name: org.graylog2:graylog2-server
Vulnerable Version: >=0 <6.0.14 || >=6.1.0 <6.1.10
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00065 pctl0.20435
Details
Graylog Allows Session Takeover via Insufficient HTML Sanitization ### Impact It is possible to obtain user session cookies by submitting an HTML form as part of an Event Definition Remediation Step field. For this attack to succeed, the attacker needs a user account with permissions to create event definitions, while the user must have permissions to view alerts. Additionally, an active Input must be present on the Graylog server that is capable of receiving form data (e.g. a HTTP input, TCP raw or syslog etc). ### Patches ### Workarounds None, as long as the relatively rare prerequisites are met. Analysis provided by Fabian Yamaguchi - Whirly Labs (Pty) Ltd
Metadata
Created: 2025-05-07T15:27:24Z
Modified: 2025-05-07T19:08:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-76vf-mpmx-777j/GHSA-76vf-mpmx-777j.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-76vf-mpmx-777j
Finding: F425
Auto approve: 1