Description
Graylog is a free and open log management platform. Starting with 6.1, HTTP Inputs can be configured to check if a specified header is present and has a specified value to authenticate HTTP-based ingestion. Unfortunately, even though in cases of a missing header or a wrong value the correct HTTP response (401) is returned, the message will be ingested nonetheless. To mitigate the vulnerability, disable http-based inputs and allow only authenticated pull-based inputs. This vulnerability is fixed in 6.1.9.
INFO
Published Date :
2025-04-07T14:37:58.071Z
Last Modified :
2025-04-08T19:02:45.783Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-30373 vulnerability.
| Vendors | Products |
|---|---|
| Graylog |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-30373.