{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-34481","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2026-03-28T19:23:37.127Z","datePublished":"2026-04-10T15:43:00.100Z","dateUpdated":"2026-04-10T17:41:38.229Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://repo.maven.apache.org/maven2","cpes":["cpe:2.3:a:apache:log4j_layout_template_json:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","packageName":"org.apache.logging.log4j:log4j-layout-template-json","packageURL":"pkg:maven/org.apache.logging.log4j/log4j-layout-template-json","product":"Apache Log4j JSON Template Layout","vendor":"Apache Software Foundation","versions":[{"lessThan":"2.25.4","status":"affected","version":"2.14.0","versionType":"maven"},{"lessThanOrEqual":"3.0.0-beta3","status":"affected","version":"3.0.0-alpha1","versionType":"maven"}]}],"credits":[{"lang":"en","type":"finder","value":"Ap4sh (Samy Medjahed) and Ethicxz (Eliott Laurie)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Apache Log4j's <code><a target=\"_blank\" rel=\"nofollow\" href=\"https://logging.apache.org/log4j/2.x/manual/json-template-layout.html\">JsonTemplateLayout</a></code>, in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (<code>NaN</code>, <code>Infinity</code>, or <code>-Infinity</code>), which are prohibited by RFC 8259. This may cause downstream log processing systems to reject or fail to index affected records.</p><p>An attacker can exploit this issue only if both of the following conditions are met:</p><ul><li>The application uses <code>JsonTemplateLayout</code>.</li><li>The application logs a <code>MapMessage</code> containing an attacker-controlled floating-point value.</li></ul><p>Users are advised to upgrade to Apache Log4j JSON Template Layout 2.25.4, which corrects this issue.</p>"}],"value":"Apache Log4j's  JsonTemplateLayout https://logging.apache.org/log4j/2.x/manual/json-template-layout.html , in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (NaN, Infinity, or -Infinity), which are prohibited by RFC 8259. This may cause downstream log processing systems to reject or fail to index affected records.\n\nAn attacker can exploit this issue only if both of the following conditions are met:\n\n  *  The application uses JsonTemplateLayout.\n  *  The application logs a MapMessage containing an attacker-controlled floating-point value.\n\n\nUsers are advised to upgrade to Apache Log4j JSON Template Layout 2.25.4, which corrects this issue."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":6.3,"baseSeverity":"MEDIUM","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"LOW","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"other":{"content":{"text":"moderate"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-116","description":"CWE-116 Improper Encoding or Escaping of Output","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2026-04-10T15:43:00.100Z"},"references":[{"tags":["patch"],"url":"https://github.com/apache/logging-log4j2/pull/4080"},{"tags":["vendor-advisory"],"url":"https://logging.apache.org/security.html#CVE-2026-34481"},{"tags":["vendor-advisory"],"url":"https://logging.apache.org/cyclonedx/vdr.xml"},{"tags":["related"],"url":"https://logging.apache.org/log4j/2.x/manual/json-template-layout.html"},{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/n34zdv00gbkdbzt2rx9rf5mqz6lhopcv"}],"source":{"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2026-02-16T18:14:00.000Z","value":"Vulnerability reported by Ap4sh and ethicxz"},{"lang":"en","time":"2026-03-10T20:42:00.000Z","value":"Candidate patch internally shared by Piotr P. Karwasz"},{"lang":"en","time":"2026-03-24T23:06:00.000Z","value":"Fix shared publicly by Piotr P. Karwasz as pull request #4080"},{"lang":"en","time":"2026-03-25T09:54:00.000Z","value":"Fix verified by the reporter"},{"lang":"en","time":"2026-03-28T11:19:00.000Z","value":"Log4j 2.25.4 released"}],"title":"Apache Log4j JSON Template Layout: Improper serialization of non-finite floating-point values in JsonTemplateLayout","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"http://www.openwall.com/lists/oss-security/2026/04/10/10"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-04-10T16:18:20.891Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-10T17:41:23.224802Z","id":"CVE-2026-34481","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-10T17:41:38.229Z"}}]}}