Log Injection High

Passing unsanitized external input directly to logging functions like log.Printf() enables log injection attacks. This allows attackers to inject malicious log entries, forge log data, or circumvent logging-based monitoring. Any user-controllable input must be sanitized before logging to prevent injection. Proper neutralization of logging input preserves log integrity and mitigates the risk of log forging or poisoning.

Detector ID
go/log-injection@v1.0
Category
Common Weakness Enumeration (CWE) external icon