Graylog is a free and open log management platform. Prior to versions 6.0.14, 6.1.10, and 6.2.0, it is possible to obtain user session cookies by submitting an HTML form as part of an Event Definition Remediation Step field. For this attack to succeed, the attacker needs a user account with permissions to create event definitions, while the user must have permissions to view alerts. Additionally, an active Input must be present on the Graylog server that is capable of receiving form data (e.g. a HTTP input, TCP raw or syslog etc). Versions 6.0.14, 6.1.10, and 6.2.0 fix the issue. No known workarounds are available, as long as the relatively rare prerequisites are met.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Graylog
         Graylog graylog  | 
|
| CPEs | cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Graylog
         Graylog graylog  | 
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Wed, 07 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 07 May 2025 15:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Graylog is a free and open log management platform. Prior to versions 6.0.14, 6.1.10, and 6.2.0, it is possible to obtain user session cookies by submitting an HTML form as part of an Event Definition Remediation Step field. For this attack to succeed, the attacker needs a user account with permissions to create event definitions, while the user must have permissions to view alerts. Additionally, an active Input must be present on the Graylog server that is capable of receiving form data (e.g. a HTTP input, TCP raw or syslog etc). Versions 6.0.14, 6.1.10, and 6.2.0 fix the issue. No known workarounds are available, as long as the relatively rare prerequisites are met. | |
| Title | Graylog Allows Session Takeover via Insufficient HTML Sanitization | |
| Weaknesses | CWE-79 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-07T15:29:31.420Z
Updated: 2025-05-07T15:50:18.084Z
Reserved: 2025-04-30T19:41:58.135Z
Link: CVE-2025-46827
Updated: 2025-05-07T15:50:14.090Z
Status : Analyzed
Published: 2025-05-07T16:15:22.720
Modified: 2025-11-03T19:29:31.520
Link: CVE-2025-46827
No data.
ReportizFlow