CVE-2026-1435

Graylog · Graylog Web Interface

Graylog Web Interface 2.2.3 fails to invalidate old session identifiers upon new logins, allowing attackers with a leaked sessionId to maintain unauthorized persistent access to the account.

Executive summary

Graylog Web Interface 2.2.3 is vulnerable to session mismanagement that allows attackers to reuse old session tokens to gain unauthorized access to administrative functions and sensitive API data.

Vulnerability

This is a session invalidation vulnerability where the application generates new session IDs but fails to revoke previous ones. An attacker who has previously obtained or intercepted a valid session token can continue to authenticate requests even after the legitimate user has re-authenticated or logged out.

Business impact

A successful exploit allows for persistent, unauthorized access to the Graylog management console and its associated APIs. Given the critical CVSS score of 9.8, this flaw poses a severe risk to data integrity and confidentiality, as Graylog often handles sensitive log data from across an entire enterprise infrastructure. Unauthorized access could lead to the exposure of proprietary logs or the modification of system configurations.

Remediation

Immediate Action: Update the Graylog Web Interface to the latest stable version provided by the vendor to ensure proper session lifecycle management.

Proactive Monitoring: Review web server and API logs for multiple concurrent sessions originating from different IP addresses for the same user account.

Compensating Controls: Implement short session timeouts and enforce multi-factor authentication (MFA) to reduce the window of opportunity for token reuse.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The severity of this vulnerability stems from the failure of a core security boundary—session management. Organizations must prioritize updating Graylog instances immediately. Failure to remediate this flaw leaves the door open for long-term persistence by malicious actors who have gained access to session identifiers.