Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2879 articles · 109889 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-34480EXPLOITEDPATCHED
apache software foundation · apache log4j core

Apache Log4j Core: Silent log event loss in XmlLayout due to unescaped XML 1.0 forbidden characters

Description

Apache Log4j Core's XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets producing invalid XML output whenever a log message or MDC value contains such characters. The impact depends on the StAX implementation in use: * JRE built-in StAX: Forbidden characters are silently written to the output, producing malformed XML. Conforming parsers must reject such documents with a fatal error, which may cause downstream log-processing systems to drop the affected records. * Alternative StAX implementations (e.g., Woodstox https://github.com/FasterXML/woodstox , a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging call, and the log event is never delivered to its intended appender, only to Log4j's internal status logger. Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue by sanitizing forbidden characters before XML output.

Affected Products

VendorProductVersions
apache software foundationapache log4j core2.0-alpha1, 3.0.0-alpha1

References

  • https://github.com/apache/logging-log4j2/pull/4077(patch)
  • https://logging.apache.org/security.html#CVE-2026-34480(vendor-advisory)
  • https://logging.apache.org/cyclonedx/vdr.xml(vendor-advisory)
  • https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout(related)
  • https://lists.apache.org/thread/5x0hcnng0chhghp6jgjdp3qmbbhfjzhb(vendor-advisory)

Related News (2 articles)

Tier C
VulDB2h ago
CVE-2026-34480 | Apache Log4j Core up to 2.25.3/3.0.0-beta3 Conforming Parser escape output
→ No new info (linked only)
Tier C
oss-security5h ago
CVE-2026-34480: Apache Log4j Core: Silent log event loss in XmlLayout due to unescaped XML 1.0 forbidden characters
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
2.25.4
CWECWE-116
PublishedApr 10, 2026
Last enriched2h agov3
Trending Score61
Source articles2
Independent2
Info Completeness9/14
Missing: cvss, epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-34477EXP
Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass
Trending: 61
NONECVE-2026-34479EXP
Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters
Trending: 60
NONECVE-2026-29146
Apache Tomcat: EncryptInterceptor vulnerable to padding oracle attack by default
Trending: 48
NONECVE-2026-24880
Apache Tomcat: Request smuggling via invalid chunk extension
Trending: 47
NONECVE-2026-29145
Apache Tomcat, Apache Tomcat Native: OCSP checks sometimes soft-fail even when soft-fail is disabled
Trending: 47

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 10, 2026
Discovered by ZDM
Apr 10, 2026
Updated: severity, affectedVersions, exploitAvailable, activelyExploited
Apr 10, 2026
Updated: description
Apr 10, 2026
Actively Exploited
Apr 10, 2026
Exploit Available
Apr 10, 2026
Patch Available
Apr 10, 2026

Version History

v3
Last enriched 2h ago
v3Tier C2h ago

Updated description with new details about CVE-2026-34480 and noted that there is no available exploit.

description
via VulDB
v2Tier C4h ago

Updated severity to MEDIUM, added new affected version 3.0.0-beta3, and marked exploit availability and active exploitation as true.

severityaffectedVersionsexploitAvailableactivelyExploited
via oss-security
v14h ago

Initial creation