Bug 2400602 (CVE-2025-11226) - CVE-2025-11226 ch.qos.logback/logback-core: Conditional abitrary code execution in logback-core
Summary: CVE-2025-11226 ch.qos.logback/logback-core: Conditional abitrary code executi...
Keywords:
Status: NEW
Alias: CVE-2025-11226
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2401177 2401178 2401179
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-01 08:01 UTC by OSIDB Bzimport
Modified: 2025-10-02 21:48 UTC (History)
82 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-10-01 08:01:52 UTC
ACE vulnerability in conditional configuration file processing  by QOS.CH logback-core up to and including version 1.5.18 in Java applications, allows an attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution.



A successful attack requires the presence of Janino library and Spring Framework to be present on the user's class path. In addition, the attacker must  have write access to a 
configuration file. Alternatively, the attacker could inject a malicious 
environment variable pointing to a malicious configuration file. In both 
cases, the attack requires existing privilege.


Note You need to log in before you can comment on or make changes to this bug.