Impact
An attacker can append to arbitrary files on the host by exploiting the /logger endpoint in Qdrant. The vulnerability allows the attacker to control the on_disk.log_file path, which is used to write data to disk. This writes sensitive data to or modifies existing files, compromising the integrity of the system and potentially the confidentiality of data stored in those files. The weakness is a classic file path input validation flaw identified as CWE-73.
Affected Systems
Systems running Qdrant versions from 1.9.3 up to, but not including, 1.16.0 are vulnerable. The affected product is Qdrant, the vector similarity search engine and vector database, across all platforms supported by those releases.
Risk and Exploitability
The CVSS score of 8.6 marks the vulnerability as high severity, while the EPSS of less than 1% indicates a low likelihood of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog, suggesting no known large‑scale exploitation. An attacker would need to reach the /logger REST endpoint and supply a crafted on_disk.log_file value. Minimal privileges are required (read‑only access), so anyone able to perform HTTP requests to the service can exploit the flaw. If the endpoint is exposed publicly, a remote attacker can trigger the write; otherwise an insider or local attacker with network access to the service could do so.
OpenCVE Enrichment
Github GHSA