Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-hhc8-3wd3-4bh5
Summary
Apache Log4j Core's XmlLayout fails to sanitize characters
Apache Log4j Core's XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the  XML 1.0 specification https://www.w3.org/TR/xml/#charsets  producing invalid XML output whenever a log message or MDC value contains such characters.

The impact depends on the StAX implementation in use:

  *  JRE built-in StAX: Forbidden characters are silently written to the output, producing malformed XML. Conforming parsers must reject such documents with a fatal error, which may cause downstream log-processing systems to drop the affected records.
  *  Alternative StAX implementations (e.g.,  Woodstox https://github.com/FasterXML/woodstox , a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging call, and the log event is never delivered to its intended appender, only to Log4j's internal status logger.


Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue by sanitizing forbidden characters before XML output.
Aliases
0
alias CVE-2026-34480
1
alias GHSA-3pxv-7cmr-fjr4
Fixed_packages
0
url pkg:maven/org.apache.logging.log4j/log4j-core@2.25.4
purl pkg:maven/org.apache.logging.log4j/log4j-core@2.25.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.logging.log4j/log4j-core@2.25.4
1
url pkg:maven/org.apache.logging.log4j/log4j-core@3.0.0-beta3
purl pkg:maven/org.apache.logging.log4j/log4j-core@3.0.0-beta3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4nzu-3a6y-jqab
1
vulnerability VCID-hhc8-3wd3-4bh5
2
vulnerability VCID-s9nz-6x8z-ykgz
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.logging.log4j/log4j-core@3.0.0-beta3
Affected_packages
0
url pkg:maven/org.apache.logging.log4j/log4j-core@2.0-alpha1
purl pkg:maven/org.apache.logging.log4j/log4j-core@2.0-alpha1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hhc8-3wd3-4bh5
1
vulnerability VCID-khr7-6pza-afab
2
vulnerability VCID-mz9r-j78c-dfe3
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.logging.log4j/log4j-core@2.0-alpha1
1
url pkg:maven/org.apache.logging.log4j/log4j-core@3.0.0-alpha1
purl pkg:maven/org.apache.logging.log4j/log4j-core@3.0.0-alpha1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4nzu-3a6y-jqab
1
vulnerability VCID-hhc8-3wd3-4bh5
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.logging.log4j/log4j-core@3.0.0-alpha1
2
url pkg:maven/org.apache.logging.log4j/log4j-core@3.0.0-beta3
purl pkg:maven/org.apache.logging.log4j/log4j-core@3.0.0-beta3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4nzu-3a6y-jqab
1
vulnerability VCID-hhc8-3wd3-4bh5
2
vulnerability VCID-s9nz-6x8z-ykgz
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.logging.log4j/log4j-core@3.0.0-beta3
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34480.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34480.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34480
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30901
published_at 2026-04-11T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30813
published_at 2026-04-13T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.30858
published_at 2026-04-12T12:55:00Z
3
value 0.00157
scoring_system epss
scoring_elements 0.36497
published_at 2026-04-16T12:55:00Z
4
value 0.00157
scoring_system epss
scoring_elements 0.36423
published_at 2026-04-21T12:55:00Z
5
value 0.00157
scoring_system epss
scoring_elements 0.3648
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34480
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/apache/logging-log4j2
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/logging-log4j2
5
reference_url https://github.com/apache/logging-log4j2/pull/4077
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-10T17:43:51Z/
url https://github.com/apache/logging-log4j2/pull/4077
6
reference_url https://lists.apache.org/thread/5x0hcnng0chhghp6jgjdp3qmbbhfjzhb
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-10T17:43:51Z/
url https://lists.apache.org/thread/5x0hcnng0chhghp6jgjdp3qmbbhfjzhb
7
reference_url https://logging.apache.org/cyclonedx/vdr.xml
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-10T17:43:51Z/
url https://logging.apache.org/cyclonedx/vdr.xml
8
reference_url https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-10T17:43:51Z/
url https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout
9
reference_url https://logging.apache.org/security.html#CVE-2026-34480
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-10T17:43:51Z/
url https://logging.apache.org/security.html#CVE-2026-34480
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-34480
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-34480
11
reference_url http://www.openwall.com/lists/oss-security/2026/04/10/9
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2026/04/10/9
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1133847
reference_id 1133847
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1133847
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457328
reference_id 2457328
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457328
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
15
reference_url https://github.com/advisories/GHSA-3pxv-7cmr-fjr4
reference_id GHSA-3pxv-7cmr-fjr4
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3pxv-7cmr-fjr4
Weaknesses
0
cwe_id 116
name Improper Encoding or Escaping of Output
description The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
1
cwe_id 168
name Improper Handling of Inconsistent Special Elements
description The product does not properly handle input in which an inconsistency exists between two or more special characters or reserved words.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-hhc8-3wd3-4bh5