Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54812: CWE-117 Improper Output Neutralization for Logs in Apache Software Foundation Apache Log4cxx

0
Low
VulnerabilityCVE-2025-54812cvecve-2025-54812cwe-117
Published: Fri Aug 22 2025 (08/22/2025, 18:46:46 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Log4cxx

Description

Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using HTMLLayout, logger names are not properly escaped when writing out to the HTML file. If untrusted data is used to retrieve the name of a logger, an attacker could theoretically inject HTML or Javascript in order to hide information from logs or steal data from the user. In order to activate this, the following sequence must occur: * Log4cxx is configured to use HTMLLayout. * Logger name comes from an untrusted string * Logger with compromised name logs a message * User opens the generated HTML log file in their browser, leading to potential XSS Because logger names are generally constant strings, we assess the impact to users as LOW This issue affects Apache Log4cxx: before 1.5.0. Users are recommended to upgrade to version 1.5.0, which fixes the issue.

AI-Powered Analysis

AILast updated: 11/10/2025, 19:08:08 UTC

Technical Analysis

CVE-2025-54812 is a vulnerability classified under CWE-117 (Improper Output Neutralization for Logs) found in Apache Log4cxx versions prior to 1.5.0. The issue arises specifically when the logging framework is configured to use the HTMLLayout, which formats log entries as HTML files. In this scenario, logger names are not properly escaped before being written into the HTML log output. If an attacker can influence or control the logger name—typically a string used to identify the source of log messages—they can inject malicious HTML or JavaScript code into the log file. When a user subsequently opens this HTML log file in a web browser, the injected script can execute, resulting in a cross-site scripting (XSS) attack. This could allow attackers to hide log entries, manipulate log content, or potentially steal sensitive information from the user viewing the logs. However, exploitation requires several conditions: the use of HTMLLayout, logger names derived from untrusted input, and user interaction to open the HTML log file. Logger names are generally static and controlled by developers, limiting the attack surface. The vulnerability has a CVSS 4.0 base score of 2.1, reflecting low severity due to the complexity and limited impact. The issue is resolved in Apache Log4cxx version 1.5.0, which properly escapes logger names in HTMLLayout outputs.

Potential Impact

For European organizations, the impact of CVE-2025-54812 is generally low but context-dependent. Organizations that generate HTML logs using Apache Log4cxx with HTMLLayout and allow untrusted input to influence logger names are at risk of XSS attacks when logs are viewed in browsers. This could lead to misleading log information, concealment of malicious activity, or theft of sensitive data from users viewing the logs. While the direct impact on confidentiality, integrity, and availability is limited, the vulnerability could aid attackers in covering tracks or conducting social engineering attacks via malicious log content. Critical sectors such as finance, healthcare, and government that rely on detailed logging for auditing and compliance may find such manipulation problematic. However, since exploitation requires user interaction and specific configuration, the overall risk remains low. European organizations should assess their use of Log4cxx, especially in environments where HTML logs are generated and viewed, to determine exposure.

Mitigation Recommendations

1. Upgrade Apache Log4cxx to version 1.5.0 or later, where the vulnerability is fixed by proper escaping of logger names in HTMLLayout. 2. Avoid using HTMLLayout for logging if possible, especially if untrusted input might influence logger names. 3. Ensure logger names are static and controlled by the application, never derived from user input or untrusted sources. 4. Implement strict input validation and sanitization on any data that could influence logger names or other log metadata. 5. Educate users and administrators to avoid opening HTML log files from untrusted sources or environments. 6. Consider alternative logging formats (e.g., plain text or JSON) that do not render in browsers or execute scripts. 7. Monitor logs for suspicious entries that could indicate attempts to inject malicious content. 8. Apply principle of least privilege to limit who can configure logging and access log files. 9. Integrate log integrity verification mechanisms to detect tampering. 10. Regularly review and audit logging configurations and practices to ensure compliance with security policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-07-30T01:08:11.079Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a8bed7ad5a09ad00216468

Added to database: 8/22/2025, 7:02:47 PM

Last enriched: 11/10/2025, 7:08:08 PM

Last updated: 11/20/2025, 10:48:46 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats