This is an automated email from the ASF dual-hosted git repository.

pkarwasz pushed a commit to branch fix/new-cves
in repository https://gitbox.apache.org/repos/asf/logging-site.git

commit b5afd830d3db3db3f798ace4240ae3a97353d318
Author: Piotr P. Karwasz <[email protected]>
AuthorDate: Fri Apr 10 14:56:04 2026 +0200

    Add details for CVE-2026-40023
---
 .../modules/ROOT/pages/_vulnerabilities.adoc       | 39 ++++++++++++++
 src/site/static/cyclonedx/vdr.xml                  | 61 ++++++++++++++++++++++
 2 files changed, 100 insertions(+)

diff --git a/src/site/antora/modules/ROOT/pages/_vulnerabilities.adoc 
b/src/site/antora/modules/ROOT/pages/_vulnerabilities.adoc
index 69ffdcbe..856cdbc3 100644
--- a/src/site/antora/modules/ROOT/pages/_vulnerabilities.adoc
+++ b/src/site/antora/modules/ROOT/pages/_vulnerabilities.adoc
@@ -29,6 +29,45 @@ Version ranges follow the 
https://github.com/package-url/vers-spec/blob/main/VER
 For brevity, mathematical interval notation is used, with the union operator 
(`∪`) to represent multiple ranges.
 ====
 
+[#CVE-2026-40023]
+== {cve-url-prefix}/CVE-2026-40023[CVE-2026-40023]
+
+[cols="1h,5"]
+|===
+|Summary |Silent log event loss in `XMLLayout` due to unescaped XML 1.0 
forbidden characters
+|CVSS 4.x Score & Vector |6.3 MEDIUM 
(CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N)
+|Components affected |Log4cxx
+|Versions affected |`[0, 1.7.0)`
+|Versions fixed |`1.7.0`
+|===
+
+[#CVE-2026-40023-description]
+=== Description
+
+Apache Log4cxx's
+https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html[`XMLLayout`],
+in versions before 1.7.0, fails to sanitize characters forbidden by the
+https://www.w3.org/TR/xml/#charsets[XML 1.0 specification]
+in log messages, NDC, and MDC property keys and values, producing invalid XML 
output.
+Conforming XML parsers must reject such documents with a fatal error, which 
may cause downstream log processing systems to drop or fail to index affected 
records.
+
+An attacker who can influence logged data can exploit this to suppress 
individual log records, impairing audit trails and detection of malicious 
activity.
+
+[#CVE-2026-40023-remediation]
+=== Remediation
+
+Users are advised to upgrade to Apache Log4cxx version `1.7.0`, which fixes 
this issue.
+
+[#CVE-2026-40023-credits]
+=== Credits
+
+This issue was discovered by Olawale Titiloye.
+
+[#CVE-2026-40023-references]
+=== References
+* {cve-url-prefix}/CVE-2026-40023[CVE-2026-40023]
+* https://github.com/apache/logging-log4cxx/pull/609[Pull request that fixes 
the issue]
+
 [#CVE-2026-40021]
 == {cve-url-prefix}/CVE-2026-40021[CVE-2026-40021]
 
diff --git a/src/site/static/cyclonedx/vdr.xml 
b/src/site/static/cyclonedx/vdr.xml
index ae0f4bb4..f2104fee 100644
--- a/src/site/static/cyclonedx/vdr.xml
+++ b/src/site/static/cyclonedx/vdr.xml
@@ -89,6 +89,67 @@
 
   <vulnerabilities>
 
+    <vulnerability>
+        <id>CVE-2026-40023</id>
+        <source>
+            <name>NVD</name>
+            <url>https://nvd.nist.gov/vuln/detail/CVE-2026-40023</url>
+        </source>
+        <ratings>
+            <rating>
+                <source>
+                    <name>The Apache Software Foundation</name>
+                    <url>
+                        
<![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url>
+                </source>
+                <score>6.3</score>
+                <severity>medium</severity>
+                <method>CVSSv4</method>
+                
<vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector>
+            </rating>
+        </ratings>
+        <cwes>
+            <cwe>116</cwe>
+        </cwes>
+        <description><![CDATA[Apache Log4cxx's
+https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html[`XMLLayout`],
+in versions before 1.7.0, fails to sanitize characters forbidden by the
+https://www.w3.org/TR/xml/#charsets[XML 1.0 specification]
+in log messages, NDC, and MDC property keys and values, producing invalid XML 
output.
+Conforming XML parsers must reject such documents with a fatal error, which 
may cause downstream log processing systems to drop or fail to index affected 
records.
+
+An attacker who can influence logged data can exploit this to suppress 
individual log records, impairing audit trails and detection of malicious 
activity.]]></description>
+        <recommendation><![CDATA[Users are advised to upgrade to Apache 
Log4cxx version `1.7.0`, which fixes this issue.]]></recommendation>
+        <created>2026-04-10T11:53:17Z</created>
+        <published>2026-04-10T11:53:17Z</published>
+        <updated>2026-04-10T11:53:17Z</updated>
+        <credits>
+            <individuals>
+                <individual>
+                    <name>Olawale Titiloye</name>
+                </individual>
+            </individuals>
+        </credits>
+        <affects>
+            <target>
+                <ref>log4cxx</ref>
+                <versions>
+                    <version>
+                        <range><![CDATA[vers:semver/>=0|<1.7.0]]></range>
+                    </version>
+                </versions>
+            </target>
+            <target>
+                <ref>log4cxx-conan</ref>
+                <versions>
+                    <version>
+                        <range><![CDATA[vers:semver/>=0|<1.7.0]]></range>
+                    </version>
+                </versions>
+            </target>
+        </affects>
+    </vulnerability>
+
     <vulnerability>
         <id>CVE-2026-40021</id>
         <source>

Reply via email to