Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the '/system/nodes/' endpoint.
References
| Link | Resource |
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog | Third Party Advisory |
Configurations
History
18 Feb 2026, 20:21
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:graylog:graylog:2.2.3:*:*:*:*:*:*:* | |
| First Time |
Graylog
Graylog graylog |
|
| References | () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
18 Feb 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 14:16
Updated : 2026-02-18 20:21
NVD link : CVE-2026-1438
Mitre link : CVE-2026-1438
CVE.ORG link : CVE-2026-1438
JSON object : View
Products Affected
graylog
- graylog
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
