CVE-2025-30373

Source
https://cve.org/CVERecord?id=CVE-2025-30373
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-30373.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-30373
Aliases
Published
2025-04-07T14:37:58.071Z
Modified
2025-12-05T08:54:37.358260Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L CVSS Calculator
Summary
Graylog Authenticated HTTP inputs do ingest message even if Authorization header is missing or has wrong value
Details

Graylog is a free and open log management platform. Starting with 6.1, HTTP Inputs can be configured to check if a specified header is present and has a specified value to authenticate HTTP-based ingestion. Unfortunately, even though in cases of a missing header or a wrong value the correct HTTP response (401) is returned, the message will be ingested nonetheless. To mitigate the vulnerability, disable http-based inputs and allow only authenticated pull-based inputs. This vulnerability is fixed in 6.1.9.

Database specific
{
    "cwe_ids": [
        "CWE-285"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/30xxx/CVE-2025-30373.json"
}
References

Affected packages

Git / github.com/graylog2/graylog2-server

Affected ranges

Type
GIT
Repo
https://github.com/graylog2/graylog2-server
Events

Affected versions

6.*
6.1.0
6.1.1
6.1.2
6.1.3
6.1.4
6.1.5
6.1.6
6.1.7
6.1.8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-30373.json"