Skip to main content

Improper Input Validation in ch.qos.logback:logback-classic

CVE-2026-1225

  • ch.qos.logback:logback-classic
  • ch.qos.logback:logback-core
Severity Low
Score 1.8/10

Summary

Arbitrary Code Execution (ACE) vulnerability in configuration file processing by QOS.CH logback-core through 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

  • HIGH
  • LOCAL
  • NONE
  • HIGH

CWE-20 - Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Advisory Timeline

  • Published