Improper Access Control (IDOR) in the Graylog API, version 2.2.3, which occurs when modifying the user ID in the URL. An authenticated user can access other user's profiles without proper authorization checks. Exploiting this vulnerability allows valid users of the system to be listed and sensitive third-party information to be accessed, such as names, email addresses, internal identifiers, and last activity. The endpoint 'http://<IP>:12900/users/<my_user>' does not implement object-level authorization validations.
History

Wed, 18 Feb 2026 13:45:00 +0000

Type Values Removed Values Added
Description Improper Access Control (IDOR) in the Graylog API, version 2.2.3, which occurs when modifying the user ID in the URL. An authenticated user can access other user's profiles without proper authorization checks. Exploiting this vulnerability allows valid users of the system to be listed and sensitive third-party information to be accessed, such as names, email addresses, internal identifiers, and last activity. The endpoint 'http://<IP>:12900/users/<my_user>' does not implement object-level authorization validations.
Title Improper Access Control (IDOR) vulnerability in Graylog Web Interface
First Time appeared Graylog
Graylog graylog Web Interface
Weaknesses CWE-639
CPEs cpe:2.3:a:graylog:graylog_web_interface:2.2.3:*:*:*:*:*:*:*
Vendors & Products Graylog
Graylog graylog Web Interface
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-02-18T14:19:37.438Z

Reserved: 2026-01-26T13:20:07.838Z

Link: CVE-2026-1436

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-18T14:16:05.850

Modified: 2026-02-18T14:16:05.850

Link: CVE-2026-1436

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.