Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Apache Log4j: Uncontrolled Deserialization in JNDI Lookups Can Lead to Remote Code Execution

CGA-fhc2-gph6-prwr
Summary

Log4j, a popular logging library used in many Java applications, contains a security weakness that could allow an attacker to inject malicious code and execute it on a server. This could potentially allow an attacker to take control of the server. Users of Log4j should update to the latest version to mitigate this risk.

What to do
  • Update chainguard label-studio to version 1.23.0-r0.
Affected software
VendorProductAffected versionsFix available
chainguard label-studio <= 1.23.0-r0 1.23.0-r0
Original title
CGA-fhc2-gph6-prwr
Published: 16 Mar 2026 · Updated: 16 Mar 2026 · First seen: 16 Mar 2026