Home

Description

Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or leaked 'sessionId' can continue to be used to authenticate valid requests. Exploiting this vulnerability would allow an attacker with access to the web service/API network (port 9000 or HTTP/S endpoint of the server) to reuse an old session token to gain unauthorized access to the application, interact with the API/web, and compromise the integrity of the affected account.

PUBLISHED Reserved 2026-01-26 | Published 2026-02-18 | Updated 2026-02-18 | Assigner INCIBE




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-613 Insufficient Session Expiration

Product status

Default status
unaffected

2.2.3
affected

Credits

Julen Garrido Estévez (B3xal) finder

References

www.incibe.es/...ices/aviso/multiple-vulnerabilities-graylog patch

cve.org (CVE-2026-1435)

nvd.nist.gov (CVE-2026-1435)

Download JSON