Improper Access Control (IDOR) in the Graylog API, version 2.2.3, which occurs when modifying the user ID in the URL. An authenticated user can access other user's profiles without proper authorization checks. Exploiting this vulnerability allows valid users of the system to be listed and sensitive third-party information to be accessed, such as names, email addresses, internal identifiers, and last activity. The endpoint 'http://<IP>:12900/users/<my_user>' does not implement object-level authorization validations.
References
| Link | Resource |
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog | Third Party Advisory |
Configurations
History
18 Feb 2026, 20:23
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Graylog
Graylog graylog |
|
| CPE | cpe:2.3:a:graylog:graylog:2.2.3:*:*:*:*:*:*:* | |
| References | () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
18 Feb 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 14:16
Updated : 2026-02-18 20:23
NVD link : CVE-2026-1436
Mitre link : CVE-2026-1436
CVE.ORG link : CVE-2026-1436
JSON object : View
Products Affected
graylog
- graylog
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
