Impact
The vulnerability is a reflected XSS flaw in the Graylog Web Interface console, specifically the /system/index_sets/ endpoint of version 2.2.3. It arises because user‑supplied URL components are inserted into the HTML response without proper encoding. An attacker can embed and execute arbitrary JavaScript when a victim follows a crafted link, allowing the execution of scripts in the victim’s browser and limited temptation of the session context. The weakness conforms to CWE‑79, a classic input‑output validation issue.
Affected Systems
Graylog’s Web Interface, version 2.2.3, is affected. All earlier releases are considered obsolete by the vendor and contain the same flaw.
Risk and Exploitability
The CVSS base score is 5.3, indicating a moderate risk level. The EPSS score is below 1 %, suggesting a very low exploitation probability at present, and the flaw is not listed in the CISA KEV catalog. Exploitation requires a user to click a specially crafted URL, so the attack vector is remote browser abuse, with no requirement for elevated privileges. Considering the low EPSS and absence from KEV, the overall risk is moderate, but patching is still recommended to eliminate the XSS vector.
OpenCVE Enrichment