Metrics
Affected Vendors & Products
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 05 Sep 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 26 Aug 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:log4cxx:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Sat, 23 Aug 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache log4cxx |
|
| Vendors & Products |
Apache
Apache log4cxx |
Fri, 22 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 22 Aug 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using JSONLayout, not all payload bytes are properly escaped. If an attacker-supplied message contains certain non-printable characters, these will be passed along in the message and written out as part of the JSON message. This may prevent applications that consume these logs from correctly interpreting the information within them. This issue affects Apache Log4cxx: before 1.5.0. Users are recommended to upgrade to version 1.5.0, which fixes the issue. | |
| Title | Apache Log4cxx: Improper escaping with JSONLayout | |
| Weaknesses | CWE-117 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: apache
Published: 2025-08-22T18:45:42.611Z
Updated: 2025-11-04T21:12:54.283Z
Reserved: 2025-07-30T01:20:34.786Z
Link: CVE-2025-54813
Updated: 2025-11-04T21:12:54.283Z
Status : Modified
Published: 2025-08-22T19:15:40.003
Modified: 2025-11-04T22:16:29.440
Link: CVE-2025-54813
ReportizFlow