External Initialization of Trusted Variables or Data Stores Affecting ch.qos.logback:logback-core package, versions [,1.5.19)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-CHQOSLOGBACK-13169722
  • published1 Oct 2025
  • disclosed1 Oct 2025
  • creditUnknown

Introduced: 1 Oct 2025

NewCVE-2025-11226  (opens in a new tab)
CWE-454  (opens in a new tab)

How to fix?

Upgrade ch.qos.logback:logback-core to version 1.5.19 or higher.

Overview

ch.qos.logback:logback-core is a logback-core module.

Affected versions of this package are vulnerable to External Initialization of Trusted Variables or Data Stores via the conditional processing of the logback.xml configuration file when both the Janino library and Spring Framework are present on the class path. An attacker can execute arbitrary code by compromising an existing configuration file or injecting a malicious environment variable before program execution. This is only exploitable if the attacker has write access to a configuration file or can set a malicious environment variable.

CVSS Base Scores

version 4.0
version 3.1