CVE-2026-25628

Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled on_disk.log_file path. Minimal privileges are required (read-only access). This vulnerability is fixed in 1.16.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qdrant:qdrant:*:*:*:*:*:*:*:*

History

19 Feb 2026, 17:45

Type Values Removed Values Added
References () https://github.com/qdrant/qdrant/blob/48203e414e4e7f639a6d394fb6e4df695f808e51/src/actix/api/service_api.rs#L195 - () https://github.com/qdrant/qdrant/blob/48203e414e4e7f639a6d394fb6e4df695f808e51/src/actix/api/service_api.rs#L195 - Product
References () https://github.com/qdrant/qdrant/commit/32b7fdfb7f542624ecd1f7c8d3e2b13c4e36a2c1 - () https://github.com/qdrant/qdrant/commit/32b7fdfb7f542624ecd1f7c8d3e2b13c4e36a2c1 - Patch
References () https://github.com/qdrant/qdrant/security/advisories/GHSA-f632-vm87-2m2f - () https://github.com/qdrant/qdrant/security/advisories/GHSA-f632-vm87-2m2f - Exploit, Mitigation, Vendor Advisory
First Time Qdrant
Qdrant qdrant
CPE cpe:2.3:a:qdrant:qdrant:*:*:*:*:*:*:*:*

06 Feb 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 21:16

Updated : 2026-02-19 17:45


NVD link : CVE-2026-25628

Mitre link : CVE-2026-25628

CVE.ORG link : CVE-2026-25628


JSON object : View

Products Affected

qdrant

  • qdrant
CWE
CWE-73

External Control of File Name or Path