CVE-2026-34478

Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
10/04/2026
Last modified:
24/04/2026

Description

Apache Log4j Core&amp;#39;s Rfc5424Layout https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout , in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented renames of security-relevant configuration attributes.<br /> <br /> Two distinct issues affect users of stream-based syslog services who configure Rfc5424Layout directly:<br /> <br /> * The newLineEscape attribute was silently renamed, causing newline escaping to stop working for users of TCP framing (RFC 6587), exposing them to CRLF injection in log output.<br /> * The useTlsMessageFormat attribute was silently renamed, causing users of TLS framing (RFC 5425) to be silently downgraded to unframed TCP (RFC 6587), without newline escaping.<br /> <br /> <br /> Users of the SyslogAppender are not affected, as its configuration attributes were not modified.<br /> <br /> Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* 2.21.0 (including) 2.25.4 (excluding)
cpe:2.3:a:apache:log4j:3.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:3.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:3.0.0:beta3:*:*:*:*:*:*