Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the '/system/nodes/' endpoint.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the '/system/nodes/' endpoint. | |
| Title | Reflected Cross-Site Scripting (XSS) vulnerability in Graylog Web Interface | |
| First Time appeared |
Graylog
Graylog graylog Web Interface |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:graylog:graylog_web_interface:2.2.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Graylog
Graylog graylog Web Interface |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-02-18T14:16:24.178Z
Reserved: 2026-01-26T13:21:01.828Z
Link: CVE-2026-1438
No data.
Status : Received
Published: 2026-02-18T14:16:06.143
Modified: 2026-02-18T14:16:06.143
Link: CVE-2026-1438
No data.
OpenCVE Enrichment
No data.