Improper Input Validation in ch.qos.logback:logback-classic
CVE-2026-1225
- ch.qos.logback:logback-classic
- ch.qos.logback:logback-core
Summary
Arbitrary Code Execution (ACE) vulnerability in configuration file processing by QOS.CH logback-core through 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.
- HIGH
- LOCAL
- NONE
- HIGH
CWE-20 - Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
References
Advisory Timeline
- Published