CVE-2025-54813

Source
https://cve.org/CVERecord?id=CVE-2025-54813
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54813.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-54813
Downstream
Published
2025-08-22T19:15:40.003Z
Modified
2026-04-12T17:14:04.505008Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Improper Output Neutralization for Logs vulnerability in Apache Log4cxx.

When using JSONLayout, not all payload bytes are properly escaped. If an attacker-supplied message contains certain non-printable characters, these will be passed along in the message and written out as part of the JSON message. This may prevent applications that consume these logs from correctly interpreting the information within them.

This issue affects Apache Log4cxx: before 1.5.0.

Users are recommended to upgrade to version 1.5.0, which fixes the issue.

References

Affected packages

Git / github.com/apache/logging-log4cxx

Affected ranges

Type
GIT
Repo
https://github.com/apache/logging-log4cxx
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "1.5.0"
        }
    ]
}

Affected versions

rel/v0.*
rel/v0.11.0
rel/v0.12.0
rel/v1.*
rel/v1.0.0
rel/v1.1.0
rel/v1.2.0
rel/v1.3.0
rel/v1.3.1
rel/v1.4.0
Other
start@308070
v0_10_0
v0_10_0-rc1@630108
v0_10_0-rc2@630385
v0_10_0-rc3@642292
v0_10_0-rc4@642345
v0_10_0-rc5@642398
v0_10_0-rc6@642451
v0_10_0-rc7@642910
v0_10_0-rc8@1554779
v0_10_0-rc8@643170
v0_10_0@1554779
v0_10_0@643170
v0_10_0@644134
v0_9_4@308324
v0_9_5@308470
v0_9_6@308556
v0_9_7@308613
v0.*
v0.11.0
v0.11.0-RC2
v0.12.0-RC1
v0.12.0-RC2
v1.*
v1.0.0-RC1
v1.1.0-RC1
v1.1.0-RC2
v1.2.0-RC1
v1.3.0-RC1
v1.3.1-RC1
v1.4.0-RC1

Database specific

vanir_signatures_modified
"2026-04-12T17:14:04Z"
vanir_signatures
[
    {
        "id": "CVE-2025-54813-120130bd",
        "signature_version": "v1",
        "digest": {
            "function_hash": "10636917034860357691950248520641527351",
            "length": 3056.0
        },
        "source": "https://github.com/apache/logging-log4cxx/commit/36d829e9f6c3f9f4f9a42e22df326a9ed7b6e373",
        "deprecated": false,
        "target": {
            "function": "HTMLLayout::format",
            "file": "src/main/cpp/htmllayout.cpp"
        },
        "signature_type": "Function"
    },
    {
        "id": "CVE-2025-54813-592ad030",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "115691767293790437547274272574744740826",
                "60396630125891992715968264925339125937",
                "327368558982129340238677189056450901036",
                "7425681559027065050971577842272102878",
                "101187088396883741962641609904519558325",
                "249990908515447934987227464968077885223"
            ],
            "threshold": 0.9
        },
        "source": "https://github.com/apache/logging-log4cxx/commit/36d829e9f6c3f9f4f9a42e22df326a9ed7b6e373",
        "deprecated": false,
        "target": {
            "file": "src/main/cpp/htmllayout.cpp"
        },
        "signature_type": "Line"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54813.json"