Metrics
Affected Vendors & Products
No advisories yet.
Solution
It is recommended to update the software to the latest version, where the vulnerability described has already been mitigated. For the affected version, the vulnerability is not mitigated, as the manufacturer considers all versions prior to the current one to be obsolete.
Workaround
No workaround given by the vendor.
Wed, 18 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or leaked 'sessionId' can continue to be used to authenticate valid requests. Exploiting this vulnerability would allow an attacker with access to the web service/API network (port 9000 or HTTP/S endpoint of the server) to reuse an old session token to gain unauthorized access to the application, interact with the API/web, and compromise the integrity of the affected account. | |
| Title | Incorrect management of session invalidation vulnerability in Graylog Web Interface | |
| First Time appeared |
Graylog
Graylog graylog Web Interface |
|
| Weaknesses | CWE-613 | |
| CPEs | cpe:2.3:a:graylog:graylog_web_interface:2.2.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Graylog
Graylog graylog Web Interface |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-02-18T13:08:36.348Z
Reserved: 2026-01-26T13:20:06.891Z
Link: CVE-2026-1435
No data.
Status : Received
Published: 2026-02-18T14:16:05.700
Modified: 2026-02-18T14:16:05.700
Link: CVE-2026-1435
No data.
OpenCVE Enrichment
No data.