CVE-2025-53106

8.8 HIGH

📋 TL;DR

Graylog users can create API tokens for any user, including administrators, by exploiting weak permission checks in the REST API. This allows privilege escalation from any authenticated user account to administrator privileges. Affects Graylog versions 6.2.0-6.2.3 and 6.3.0-alpha.1 through 6.3.0-rc.1.

💻 Affected Systems

Products:
  • Graylog
Versions: 6.2.0 to 6.2.3, 6.3.0-alpha.1 to 6.3.0-rc.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; personal access token feature must be enabled (default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Any authenticated user becomes full administrator, gaining complete control over the Graylog instance including access to all logs, configuration changes, and user management.

🟠

Likely Case

Malicious insider or compromised account escalates privileges to administrator level, potentially accessing sensitive log data or disrupting logging operations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized API token creation which can be detected and revoked.

🌐 Internet-Facing: HIGH - If Graylog is internet-accessible, any compromised user account can lead to complete system takeover.
🏢 Internal Only: HIGH - Even internally, any authenticated user can escalate to administrator privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access and knowledge of target user IDs; API requests are straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.2.4 or 6.3.0-rc.2

Vendor Advisory: https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-3m86-c9x3-vwm9

Restart Required: Yes

Instructions:

1. Backup Graylog configuration and data. 2. Stop Graylog services. 3. Upgrade to Graylog 6.2.4 or 6.3.0-rc.2. 4. Restart Graylog services. 5. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Disable Personal Access Tokens

all

Disable the ability for users to create personal access tokens via Graylog web interface

🧯 If You Can't Patch

  • Disable personal access token creation in System > Configuration > Users > 'Allow users to create personal access tokens'
  • Implement strict access controls, monitor API token creation logs, and regularly audit existing tokens

🔍 How to Verify

Check if Vulnerable:

Check Graylog version via web interface Admin > System > Nodes or via API GET /api/system

Check Version:

curl -u admin:password -X GET http://graylog-server:9000/api/system | grep version

Verify Fix Applied:

Confirm version is 6.2.4 or higher, or 6.3.0-rc.2 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual API token creation events
  • Token creation for users other than the requesting user
  • Multiple token creation attempts

Network Indicators:

  • POST requests to /api/users/[user-id]/tokens from non-admin users

SIEM Query:

source="graylog" AND ("created token" OR "personal access token") AND user!="admin"

🔗 References

📤 Share & Export