Apache Log4j Core: log injection in `Rfc5424Layout` due to silent configuration incompatibility
Moderate severity
GitHub Reviewed
Published
Apr 10, 2026
to the GitHub Advisory Database
•
Updated Apr 14, 2026
Package
Affected versions
>= 2.21.0, < 2.25.4
>= 3.0.0-beta1, <= 3.0.0-beta3
Patched versions
2.25.4
Description
Published by the National Vulnerability Database
Apr 10, 2026
Published to the GitHub Advisory Database
Apr 10, 2026
Reviewed
Apr 14, 2026
Last updated
Apr 14, 2026
Apache Log4j Core's
Rfc5424Layout, in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented renames of security-relevant configuration attributes.Two distinct issues affect users of stream-based syslog services who configure Rfc5424Layout directly:
newLineEscapeattribute was silently renamed, causing newline escaping to stop working for users of TCP framing (RFC 6587), exposing them to CRLF injection in log output.useTlsMessageFormatattribute was silently renamed, causing users of TLS framing (RFC 5425) to be silently downgraded to unframed TCP (RFC 6587), without newline escaping.Users of the
SyslogAppenderare not affected, as its configuration attributes were not modified.Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.
References