Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.3
Graylog Web Interface console: Malicious scripts can be injected via URLs
CVE-2026-1439
Summary
A flaw in the Graylog Web Interface console allows attackers to inject malicious scripts into a user's browser. This can lead to unauthorized actions being taken on the user's account. To fix this, update to a patched version of Graylog or apply a security patch.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| graylog | graylog | 2.2.3 | – |
Original title
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints includ...
Original description
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the '/
alerts
/' endpoint.
alerts
/' endpoint.
nvd CVSS3.1
6.1
nvd CVSS4.0
5.3
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gray... Third Party Advisory
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026