Improper Access Control (IDOR) in the Graylog API, version 2.2.3, which occurs when modifying the user ID in the URL. An authenticated user can access other user's profiles without proper authorization checks. Exploiting this vulnerability allows valid users of the system to be listed and sensitive third-party information to be accessed, such as names, email addresses, internal identifiers, and last activity. The endpoint 'http://<IP>:12900/users/<my_user>' does not implement object-level authorization validations.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Access Control (IDOR) in the Graylog API, version 2.2.3, which occurs when modifying the user ID in the URL. An authenticated user can access other user's profiles without proper authorization checks. Exploiting this vulnerability allows valid users of the system to be listed and sensitive third-party information to be accessed, such as names, email addresses, internal identifiers, and last activity. The endpoint 'http://<IP>:12900/users/<my_user>' does not implement object-level authorization validations. | |
| Title | Improper Access Control (IDOR) vulnerability in Graylog Web Interface | |
| First Time appeared |
Graylog
Graylog graylog Web Interface |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:graylog:graylog_web_interface:2.2.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Graylog
Graylog graylog Web Interface |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published: 2026-02-18T13:09:35.443Z
Updated: 2026-02-18T14:19:37.438Z
Reserved: 2026-01-26T13:20:07.838Z
Link: CVE-2026-1436
Updated: 2026-02-18T14:19:32.654Z
Status : Received
Published: 2026-02-18T14:16:05.850
Modified: 2026-02-18T14:16:05.850
Link: CVE-2026-1436
No data.