Vulnerability Description
Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled on_disk.log_file path. Minimal privileges are required (read-only access). This vulnerability is fixed in 1.16.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qdrant | Qdrant | >= 1.9.3, <= 1.16.0 |
Related Weaknesses (CWE)
References
- https://github.com/qdrant/qdrant/blob/48203e414e4e7f639a6d394fb6e4df695f808e51/sProduct
- https://github.com/qdrant/qdrant/commit/32b7fdfb7f542624ecd1f7c8d3e2b13c4e36a2c1Patch
- https://github.com/qdrant/qdrant/security/advisories/GHSA-f632-vm87-2m2fExploitMitigationVendor Advisory
FAQ
What is CVE-2026-25628?
CVE-2026-25628 is a vulnerability with a CVSS score of 8.5 (HIGH). Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled on_disk.log_...
How severe is CVE-2026-25628?
CVE-2026-25628 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25628?
Check the references section above for vendor advisories and patch information. Affected products include: Qdrant Qdrant.