logo

CVE-2025-46827 org.graylog2:graylog2-server

Package

Manager: maven
Name: org.graylog2:graylog2-server
Vulnerable Version: >=0 <6.0.14 || >=6.1.0 <6.1.10

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00065 pctl0.20435

Details

Graylog Allows Session Takeover via Insufficient HTML Sanitization ### Impact It is possible to obtain user session cookies by submitting an HTML form as part of an Event Definition Remediation Step field. For this attack to succeed, the attacker needs a user account with permissions to create event definitions, while the user must have permissions to view alerts. Additionally, an active Input must be present on the Graylog server that is capable of receiving form data (e.g. a HTTP input, TCP raw or syslog etc). ### Patches ### Workarounds None, as long as the relatively rare prerequisites are met. Analysis provided by Fabian Yamaguchi - Whirly Labs (Pty) Ltd

Metadata

Created: 2025-05-07T15:27:24Z
Modified: 2025-05-07T19:08:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-76vf-mpmx-777j/GHSA-76vf-mpmx-777j.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-76vf-mpmx-777j
Finding: F425
Auto approve: 1