Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. ch.qos.logback/logback-core
  4. ›
  5. CVE-2026-1225

CVE-2026-1225: Logback allows an attacker to instantiate classes already present on the class path

January 22, 2026

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file.

The instantiation of a potentially malicious Java class requires that said class is present on the user’s class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

References

  • github.com/advisories/GHSA-qqpg-mvqg-649v
  • github.com/qos-ch/logback
  • github.com/qos-ch/logback/commit/1f97ae1844b1be8486e4e9cade98d7123d3eded5
  • github.com/qos-ch/logback/issues/997
  • logback.qos.ch/news.html
  • nvd.nist.gov/vuln/detail/CVE-2026-1225

Code Behaviors & Features

Detect and mitigate CVE-2026-1225 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.5.25

Fixed versions

  • 1.5.25

Solution

Upgrade to version 1.5.25 or above.

Impact 5 MEDIUM

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

maven/ch.qos.logback/logback-core/CVE-2026-1225.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:18 +0000.