CVE-2026-1435: Not
CVE-2026-1435
Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId...
Overview
A critical security flaw has been identified in the Graylog web interface. This vulnerability stems from a failure to properly terminate user sessions, allowing old login credentials to remain active indefinitely. This flaw could enable unauthorized access to sensitive log management data and system controls.
Vulnerability Description
In simple terms, when a user logs into the affected Graylog system, the application creates a new session token. However, it does not cancel the user’s previous session tokens. These old tokens, which could have been stolen or leaked at any point, remain fully valid. An attacker who obtains one of these tokens can use it to impersonate the legitimate user, gaining access without needing a password or multi-factor authentication.
Affected Systems
- Software: Graylog Web Interface
- Version: 2.2.3
- Exposure: The web interface and API, typically accessible on port 9000 or via the server’s HTTP/HTTPS endpoint.
Potential Impact
The impact of this vulnerability is severe (CVSS Score: 9.8 - CRITICAL). Successful exploitation could lead to:
- Unauthorized Access: Attackers can gain full access to a compromised user’s account within Graylog.
- Data Breach & Tampering: Sensitive log data could be viewed, exported, altered, or deleted, compromising forensic integrity.
- System Compromise: Attackers could manipulate Graylog configurations, create new user accounts, or disrupt monitoring and alerting functions.
Remediation and Mitigation
Immediate action is required to protect affected systems.
-
Apply the Official Patch: The primary fix is to upgrade Graylog to a patched version. Consult the official Graylog security advisories for version 2.2.4 or later, which resolves this issue. Always test upgrades in a non-production environment first.
-
Immediate Mitigations (If Patching is Delayed):
- Enforce Network Controls: Restrict access to the Graylog web interface (port 9000/TCP) using firewall rules. Allow connections only from trusted, necessary administrative networks or IP ranges.
- Monitor for Suspicious Activity: Closely review Graylog audit logs and authentication logs for concurrent logins from multiple locations or unusual activity from known user accounts.
- Proactive Session Invalidation: As an administrative workaround, you can manually force all users to log out by restarting the Graylog web service. This will invalidate all current sessions but is only a temporary measure.
All administrators of Graylog 2.2.3 should prioritize upgrading to a secured version to eliminate this risk.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers witho...
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 15 (MemoryMapRange) allows Ring 3 user-mode processes to map arbitrary virtual address r...