๐Ÿ” CVE Alert

CVE-2026-40023

UNKNOWN 0.0

Apache Log4cxx, Apache Log4cxx (Conan), Apache Log4cxx (Brew): Silent log event loss in XMLLayout due to unescaped XML 1.0 forbidden characters

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Apache Log4cxx's XMLLayout https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html , in versions before 1.7.0, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets in log messages, NDC, and MDC property keys and values, producing invalid XML output. Conforming XML parsers must reject such documents with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. An attacker who can influence logged data can exploit this to suppress individual log records, impairing audit trails and detection of malicious activity. Users are advised to upgrade to Apache Log4cxx 1.7.0, which fixes this issue.

CWE CWE-116
Vendor apache software foundation
Product apache log4cxx
Published Apr 10, 2026
Last Updated Apr 10, 2026
Stay Ahead of the Next One

Get instant alerts for apache software foundation apache log4cxx

Be the first to know when new unknown vulnerabilities affecting apache software foundation apache log4cxx are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Apache Software Foundation / Apache Log4cxx
0 < 1.7.0
Apache Software Foundation / Apache Log4cxx (Conan)
0 < 1.7.0
Apache Software Foundation / Apache Log4cxx (Brew)
0 < 1.7.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/apache/logging-log4cxx/pull/609 logging.apache.org: https://logging.apache.org/security.html#CVE-2026-40023 logging.apache.org: https://logging.apache.org/cyclonedx/vdr.xml logging.apache.org: https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html lists.apache.org: https://lists.apache.org/thread/y15cv3zblg3dfwr5vy6ddbnl4zyrzr8b openwall.com: http://www.openwall.com/lists/oss-security/2026/04/10/12

Credits

Olawale Titiloye