Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled on_disk.log_file path. Minimal privileges are required (read-only access). This vulnerability is fixed in 1.16.0.
References
Configurations
History
19 Feb 2026, 17:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/qdrant/qdrant/blob/48203e414e4e7f639a6d394fb6e4df695f808e51/src/actix/api/service_api.rs#L195 - Product | |
| References | () https://github.com/qdrant/qdrant/commit/32b7fdfb7f542624ecd1f7c8d3e2b13c4e36a2c1 - Patch | |
| References | () https://github.com/qdrant/qdrant/security/advisories/GHSA-f632-vm87-2m2f - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Qdrant
Qdrant qdrant |
|
| CPE | cpe:2.3:a:qdrant:qdrant:*:*:*:*:*:*:*:* |
06 Feb 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 21:16
Updated : 2026-02-19 17:45
NVD link : CVE-2026-25628
Mitre link : CVE-2026-25628
CVE.ORG link : CVE-2026-25628
JSON object : View
Products Affected
qdrant
- qdrant
CWE
CWE-73
External Control of File Name or Path
