Metrics
Affected Vendors & Products
No advisories yet.
Solution
It is recommended to update the software to the latest version, where the vulnerability described has already been mitigated. For the affected version, the vulnerability is not mitigated, as the manufacturer considers all versions prior to the current one to be obsolete.
Workaround
No workaround given by the vendor.
Wed, 18 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the '/system/authentication/users/edit/' endpoint. | |
| Title | Reflected Cross-Site Scripting (XSS) vulnerability in Graylog Web Interface | |
| First Time appeared |
Graylog
Graylog graylog Web Interface |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:graylog:graylog_web_interface:2.2.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Graylog
Graylog graylog Web Interface |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-02-18T14:18:50.657Z
Reserved: 2026-01-26T13:21:00.860Z
Link: CVE-2026-1437
Updated: 2026-02-18T14:18:42.479Z
Status : Received
Published: 2026-02-18T14:16:05.993
Modified: 2026-02-18T14:16:05.993
Link: CVE-2026-1437
No data.
OpenCVE Enrichment
No data.