Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Apache Log4j: Uncontrolled Deserialization in JNDI Lookups Can Lead to Remote Code Execution
CGA-fhc2-gph6-prwr
Summary
Log4j, a popular logging library used in many Java applications, contains a security weakness that could allow an attacker to inject malicious code and execute it on a server. This could potentially allow an attacker to take control of the server. Users of Log4j should update to the latest version to mitigate this risk.
What to do
- Update chainguard label-studio to version 1.23.0-r0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| chainguard | label-studio | <= 1.23.0-r0 | 1.23.0-r0 |
Original title
CGA-fhc2-gph6-prwr
Published: 16 Mar 2026 · Updated: 16 Mar 2026 · First seen: 16 Mar 2026