CVE-2026-1435

Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or leaked 'sessionId' can continue to be used to authenticate valid requests. Exploiting this vulnerability would allow an attacker with access to the web service/API network (port 9000 or HTTP/S endpoint of the server) to reuse an old session token to gain unauthorized access to the application, interact with the API/web, and compromise the integrity of the affected account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:graylog:graylog:2.2.3:*:*:*:*:*:*:*

History

18 Feb 2026, 20:22

Type Values Removed Values Added
First Time Graylog
Graylog graylog
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog - () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog - Third Party Advisory
CPE cpe:2.3:a:graylog:graylog:2.2.3:*:*:*:*:*:*:*

18 Feb 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 14:16

Updated : 2026-02-18 20:22


NVD link : CVE-2026-1435

Mitre link : CVE-2026-1435

CVE.ORG link : CVE-2026-1435


JSON object : View

Products Affected

graylog

  • graylog
CWE
CWE-613

Insufficient Session Expiration