📦 Graylog

by Graylog

🔍 What is Graylog?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2021-37759

CRITICAL CVSS 9.8 Jul 31, 2021

This vulnerability allows attackers to steal session IDs from Graylog DEBUG log files, enabling them to impersonate legitimate users and gain their access privileges. All Graylog installations before ...

CVE-2025-53106

HIGH CVSS 8.8 Jul 2, 2025

Graylog users can create API tokens for any user, including administrators, by exploiting weak permission checks in the REST API. This allows privilege escalation from any authenticated user account t...

CVE-2024-24824

HIGH CVSS 8.8 Feb 7, 2024

This vulnerability in Graylog allows authenticated users with appropriate permissions to load and instantiate arbitrary Java classes via HTTP PUT requests to the cluster config endpoint. This can lead...

CVE-2026-1438

MEDIUM CVSS 6.1 Feb 18, 2026

A reflected Cross-Site Scripting (XSS) vulnerability in Graylog Web Interface version 2.2.3 allows attackers to inject and execute arbitrary JavaScript code via specially crafted URLs. This affects Gr...

CVE-2026-1440

MEDIUM CVSS 6.1 Feb 18, 2026

A reflected Cross-Site Scripting (XSS) vulnerability in Graylog Web Interface version 2.2.3 allows attackers to inject malicious JavaScript via specially crafted URLs. When users visit these URLs, arb...

CVE-2026-1436

MEDIUM CVSS 6.5 Feb 18, 2026

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Graylog API version 2.2.3 where authenticated users can modify user IDs in API URLs to access other users' profiles witho...

CVE-2024-52506

MEDIUM CVSS 6.5 Nov 18, 2024

This vulnerability in Graylog's reporting functionality allows authorized users to potentially access other users' reports when multiple concurrent report rendering requests occur. This could leak log...