ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.
References
History

Thu, 22 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
Description ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.
Title Conditional processing of logback.xml configuration file, in conjuction with Spring Framework and Janino
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 1.8, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/S:N/AU:N/RE:M/U:Green'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-01-22T09:24:14.634Z

Reserved: 2026-01-20T12:29:25.357Z

Link: CVE-2026-1225

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-22T10:16:07.693

Modified: 2026-01-22T10:16:07.693

Link: CVE-2026-1225

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.