Description

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

INFO

Published Date :

2026-01-22T09:24:14.634Z

Last Modified :

2026-01-22T14:14:17.842Z

Source :

NCSC.ch
AFFECTED PRODUCTS

The following products are affected by CVE-2026-1225 vulnerability.

Vendors Products
Qos
  • Logback
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-1225.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact