Home

Description

Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the '/system/authentication/users/edit/' endpoint.

PUBLISHED Reserved 2026-01-26 | Published 2026-02-18 | Updated 2026-02-18 | Assigner INCIBE




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

2.2.3
affected

Credits

Julen Garrido Estévez (B3xal) finder

References

www.incibe.es/...ices/aviso/multiple-vulnerabilities-graylog patch

cve.org (CVE-2026-1437)

nvd.nist.gov (CVE-2026-1437)

Download JSON