CVE-2026-1435 PUBLISHED

Incorrect management of session invalidation vulnerability in Graylog Web Interface

Assigner: INCIBE
Reserved: 26.01.2026 Published: 18.02.2026 Updated: 18.02.2026

Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or leaked 'sessionId' can continue to be used to authenticate valid requests. Exploiting this vulnerability would allow an attacker with access to the web service/API network (port 9000 or HTTP/S endpoint of the server) to reuse an old session token to gain unauthorized access to the application, interact with the API/web, and compromise the integrity of the affected account.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor Graylog
Product Graylog Web Interface
Versions Default: unaffected
  • Version 2.2.3 is affected

Solutions

It is recommended to update the software to the latest version, where the vulnerability described has already been mitigated. For the affected version, the vulnerability is not mitigated, as the manufacturer considers all versions prior to the current one to be obsolete.

Credits

  • Julen Garrido Estévez (B3xal) finder

References

Problem Types

  • CWE-613 Insufficient Session Expiration CWE