Improper Output Neutralization for Logs Affecting org.apache.logging.log4j:log4j-core package, versions [2.21.0, 2.25.4)[3.0.0-beta1,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.17% (39th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Output Neutralization for Logs vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHELOGGINGLOG4J-15967739
  • published10 Apr 2026
  • disclosed10 Apr 2026
  • creditSamuli Leinonen

Introduced: 10 Apr 2026

CVE-2026-34478  (opens in a new tab)
CWE-117  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

org.apache.logging.log4j:log4j-core is a logging library for Java.

Affected versions of this package are vulnerable to Improper Output Neutralization for Logs in the Rfc5424Layout plugin due to newLineEscape and useTlsMessageFormat configuration attributes being silently renamed, leading to improper handling of newline escaping for TCP framing and incorrect message formatting for TLS framing. An attacker can inject arbitrary log entries by supplying crafted CRLF sequences in log messages, potentially manipulating log output or bypassing log-based security controls.

Note:

This is only exploitable if the Rfc5424Layout is configured directly with affected attributes in stream-based syslog services.

Users of the SyslogAppender are not affected, as its configuration attributes were not modified.

CVSS Base Scores

version 4.0
version 3.1