Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <aa65e537-1ba5-7e0b-617f-cd3afc9e2ef5@apache.org>
Date: Fri, 22 Aug 2025 18:17:25 +0000
From: Piotr Karwasz <pkarwasz@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-54813: Apache Log4cxx: Improper escaping with JSONLayout 

Severity: moderate 

Affected versions:

- Apache Log4cxx 0.11.0 before 1.5.0

Description:

Improper Output Neutralization for Logs vulnerability in Apache Log4cxx.

When using JSONLayout, not all payload bytes are properly escaped. If an attacker-supplied message contains certain non-printable characters, these will be passed along in the message and written out as part of the JSON message. This may prevent applications that consume these logs from correctly interpreting the information within them.

This issue affects Apache Log4cxx: before 1.5.0.

Users are recommended to upgrade to version 1.5.0, which fixes the issue.

Credit:

Sovereign Tech Agency (sponsor)

References:

https://logging.apache.org/security.html#CVE-2025-54813
https://github.com/apache/logging-log4cxx/pull/512
https://logging.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-54813

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.