Description
Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or leaked 'sessionId' can continue to be used to authenticate valid requests. Exploiting this vulnerability would allow an attacker with access to the web service/API network (port 9000 or HTTP/S endpoint of the server) to reuse an old session token to gain unauthorized access to the application, interact with the API/web, and compromise the integrity of the affected account.
INFO
Published Date :
2026-02-18T13:08:36.348Z
Last Modified :
2026-02-18T20:24:40.349Z
Source :
INCIBE
AFFECTED PRODUCTS
The following products are affected by CVE-2026-1435 vulnerability.
| Vendors | Products |
|---|---|
| Graylog |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-1435.